Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

Impact Creator Society

406 members • Free

CyberHero School

1.8k members • Free

CISSP Study Group

1.7k members • Free

The Cyber Community

6.9k members • Free

108 contributions to CISSP Study Group
CISSP Practice Question – Security Architecture & Engineering (Post-Quantum Risk & Long-Term Data Confidentiality)
A pharmaceutical company stores decades of proprietary research data in encrypted archives. Recent threat intelligence reports warn that several nation-state actors are collecting large volumes of encrypted data today (ā€œharvest-now, decrypt-laterā€) in preparation for future quantum decryption capabilities. The company currently uses RSA-2048 for key exchange and AES-256 for bulk encryption. What is the MOST critical action to take to protect the long-term confidentiality of this archived data? A. Increase RSA key length to 4096 bits to delay quantum-based decryption timelines. B. Migrate to a hybrid post-quantum key-establishment scheme (e.g., classical + lattice-based) for future encryptions and begin re-encrypting high-value archives. C. Deploy quantum-random number generators (QRNGs) to improve entropy for new cryptographic keys. D. Implement HSM-protected symmetric keys with annual rotation to strengthen present-day cryptographic hygiene.
0 likes • 24h
B - Post-quantum cryptography is the development of new kinds of cryptographic approaches that can be implemented using today’s conventional computers, but will be impervious (resistant) to attacks from tomorrow’s quantum computers. Lattice-based cryptography is a post-quantum cryptographic approach that relies on the hardness of certain problems in lattices (grids of evenly spaced points that extend infinitely in every direction), which are expected to remain secure even against quantum computers.
CISSP Exam Pass Today šŸ˜Ž
I am excited to share that I have provisionally passed the CISSP exam today It took a while, months of effort and discipline, including overcoming a previous failed attempt. Thanks to my family, friends and CISSP Study Group Community, i could have not done this without any of you! @Vincent Primiani thanks for putting together this wonderful community of liked minded people, with a common goal of achieving the much sought after CISSP certification. I'm not going anywhere, i am still going to be a member of this community and help where i can, and of course onto the next one ......
0 likes • 1d
Congratulations & welcome to the club.
Exam Strategy Guide: Using Keyword Relationships to Select the Correct Answer
This guide teaches you how to use keywords, qualifiers, semantic relationships, and logical connections to increase the probability of selecting the correct answer on certification exams such as CISSP, Security+, CCSK, ISO, ITIL, and other exams.
5
0
CISSP Practice Question – Domain 6: Security Assessment & Testing
A large financial services company is updating its security testing program. The red team reports that modern AI-driven attack tools can automatically craft polymorphic payloads, evade signature-based controls, and generate targeted spear-phishing content indistinguishable from human-written messages.The CISO wants to ensure that the organization’s security testing program can accurately measure resilience against these new capabilities. Which testing approach MOST effectively validates the organization’s defenses against AI-augmented attack techniques? A. Perform quarterly vulnerability scans using updated threat signatures and CVE databases. B. Conduct adversarial machine learning (AML) evaluations to measure susceptibility to model poisoning and evasion attacks. C. Integrate AI-enabled BAS (Breach and Attack Simulation) tools that continuously replicate evolving attacker TTPs across email, endpoint, and network layers. D. Run annual red-team exercises focused on social engineering and spear-phishing campaigns executed manually by trained personnel.
2 likes • 2d
The red team reports 3 concerns: 1. AI-driven attack tools can automatically craft polymorphic payloads -> network layers 2. evade signature-based controls -> endpoint 3. generate targeted spear-phishing content indistinguishable from human-written messages -> email C addresses all 3 concerns: email, endpoint, and network layers.
A new threat landscape is coming - this security firm CEO thinks nation-states will have weaponized quantum computers within the next five years
- Hostile nations may soon exploit quantum computers to compromise existing encryption standards - Current firewalls could require replacement to remain effective against quantum-enabled threats - AI-integrated enterprise browsers increase exposure to attacks on corporate networks https://www.techradar.com/pro/security/security-firm-ceo-thinks-nation-states-will-have-weaponized-quantum-computers-within-the-next-five-years
1
0
1-10 of 108
David Hawkins
5
352points to level up
@david-hawkins-2216
I'm a Jr. Cybersecurity Analyst with 25+ years of IT experience, a USAF veteran & also a technology advisor to my wife's businesses.

Active 7h ago
Joined Nov 26, 2024
Denver metro area
Powered by