Open in app

Sign In

Write

Sign In

Sean Byrne
Sean Byrne

28 Followers

Home

About

Jan 2

A photo compilation of other things…

On the side, I like plants and neature State flower of this state.

Plants

3 min read

A photo compilation of other things…
A photo compilation of other things…
Plants

3 min read


Dec 19, 2022

A list of lists important in IT and cybersecurity

…according to CompTIA — Intro I’m studying to get my CompTIA Security+ certification and this will be a study guide. As I prepare for the exam, I’ll keep adding to this post. The 5 Main Categories of the CompTIA Security+ exam Attacks, Threats and Vulnerabilities Architecture & Design Implementation Operations & Incident Response Governance, Risk & Compliance The OSI (open systems interconnection) model

Comptia

3 min read

A list of lists important in IT and cybersecurity
A list of lists important in IT and cybersecurity
Comptia

3 min read


Dec 18, 2022

5 (maybe just 3) Quick Tips for Newbies to Securing an AWS Linux Server

You’re running a Linux server on the AWS cloud for your website or hacking lab or whatever, but maybe you haven’t fully secured it? These 5/3 tips might be what you’re missing. — Intro These tips are pretty basic and you might know some of them. When used all together, though, they have a cumulative effect in hardening the security posture of a remote server. In the following post, we’ll cover… Enable automatic updates

Cloud Services

5 min read

5 (maybe just 3) Quick Tips for Newbies to Securing an AWS Linux Server
5 (maybe just 3) Quick Tips for Newbies to Securing an AWS Linux Server
Cloud Services

5 min read


Dec 9, 2022

Network Ports, Port Numbers, and what they do…

These are the Port Numbers that should be memorized for the CompTIA Security+ exam — Intro Ports are an important concept in IT and network security. I find it confusing that they’re called ports, but whatever. To obtain the CompTIA Security+ certificate, memorizing the port numbers and their respective protocols will help immensely. This article will cover the basics of what a port is in the…

Comptia

8 min read

Network Ports, Port Numbers, and what they do…
Network Ports, Port Numbers, and what they do…
Comptia

8 min read


Jul 20, 2022

How to grow food, hydroponically

It’s not as straight forward as growing in dirt, but this method is much cleaner and actually pretty easy. I recommend trying this for growing veggies indoors, like in an apartment. — What is hydroponics? A really curious gentleman find out some time ago that plants don’t need dirt to grow. Plants just grow in dirt because the dirt has nutrients, water, and provides a medium into which roots can grow to anchor down for support and stability. …

Urban Farming

6 min read

How to grow food, hydroponically
How to grow food, hydroponically
Urban Farming

6 min read


Jul 12, 2022

Supply Chain Assessment: 4 Important Considerations

How can we be assured that our electronics and phones and stuff haven’t had “extra things” added to them before being sold to us? Is our data safe when using some apps? Practicing good Supply Chain Assessment can prevent these scenarios — One aspect of cybersecurity is being aware of the products and hardware we use for our network infrastructure at our homes and businesses. This also means that we need to take into consideration all of the parts that go into each product.

Supply Chain

5 min read

Supply Chain Assessment: 4 Important Considerations
Supply Chain Assessment: 4 Important Considerations
Supply Chain

5 min read


Jun 23, 2022

Let’s Get Physical

Shall we discuss the differences between Olivia Newton-John’s version of Physical and Dua Lipa’s version of Physical? As much as I would love to, alas, that won’t be what we’ll discuss. Instead we’re going to cover something much less interesting and that is the physical aspects of cybersecurity. — Physical Security There’s something really simple to remember regarding the physical aspect of cybersecurity:

Security

4 min read

Let’s Get Physical
Let’s Get Physical
Security

4 min read


Jun 23, 2022

Facilities Security

Spoiler alert! This will not cover fences. — Facility Security Good cybersecurity is holistic, especially when you incorporate a defense-in-depth strategy. Every angle must be considered and this means the task of securing our digital assets spills over into the physical realm. In the following sections we’ll explore how to best support digital operations with facility design. By facility design…

Operations Management

11 min read

Facilities Security
Facilities Security
Operations Management

11 min read


Published in CodeX

·Jun 18, 2022

Hardening

Yeah, I agree. This term sounds funny, but get your head out of the gutter. It actually has to do with improving cybersecurity. — The more formal definition, according to CompTIA, is: The act of configuring an operating system securely by updating it, creating rules and policies to govern it, and removing unnecessary applications and services. However, it’s important to realize that this is not a one-’n’-done type of process. This is an ongoing…

Cybersecurity

8 min read

Hardening
Hardening
Cybersecurity

8 min read


Published in CodeX

·Jun 17, 2022

Mobile Device Security

This is exactly as it sounds. If you’re reading this article on your phone, tablet, laptop, etc… then this is surely relevant to you. If you still use a pager then you can skip this one. Anyway, we’ll cover what threats we can expect and what we can do to protect ourselves. — Securing Wireless Devices To keep mobile devices secure, it’s important to have secure connections and that means secure WiFi and Bluetooth. For WiFi, that means using a WPA2 (WiFi Protected Access 2) connection. …

Smartphones

6 min read

Mobile Device Security
Mobile Device Security
Smartphones

6 min read

Sean Byrne

Sean Byrne

28 Followers

I’m a data scientist

Following
  • Tim Denning

    Tim Denning

  • John Au-Yeung

    John Au-Yeung

  • Hacktivities

    Hacktivities

  • Scott Galloway

    Scott Galloway

  • Celsius

    Celsius

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech