What is it? And how should we see it from the cybersecurity perspective

Illustration: Eniola Odetunde/Axios [1]

Since the beginning of COVID-19, most of us are learning how to adapt to the new normal, we are also learning new things and terms. Recently, a new term has been widely used, which is “Vaccine Passport”.

As COVID-19 vaccines are rolling out across the world, governments around the world began to mull the idea of vaccine passport and they are even considering to make it mandatory.

Furthermore, not only governments who are suggesting this idea, but also airline companies started considering the requirement of vaccine passport for traveling. …

A Look into the World of Social Engineering!!

Photo by Austin Distel on Unsplash

I was once discussing social engineering with a friend of mine, and how social engineers can (sometimes) easily collect information about their target from social media, but she seemed surprised.

“You know what does ‘social engineer’ mean, don’t you?” I asked.

“Yes, they are the engineers who deal with social science,” my friend replied.

It was that moment when I decided to share my knowledge and write about it because, naturally, anyone who is not familiar with the world of social engineering would think the same.

In this post, you will learn about social engineering and explore it by going…

Building a machine learning (ML) model is not always straightforward, the workflow may be encapsulated into few clear steps including data collection and preparation, model training and evaluation and model deployment. However, achieving a high accuracy is not the only correct way we should rely on to measure the model performance in order to deploy our ML model to production. An overly optimistic accuracy results may indicate something fishy. But how can we know the issues behind it? Well, most of ML practitioners should be familiar with Overfitting, which is one problem we may be encountering or maybe Data Leakage.

Steve Wozniak is the designer of the first commercially successful personal computer. Charles Babbage is the inventor who is credited with having conceived the first automatic digital computer.

Network analysis is the process of capturing network traffic/packets and analyze it. Network analysis is mostly used by network administrators as it offers an insight into network communication that can help to troubleshoot network problems, monitor and control network communications, analyze application behaviour and also to detect network security threats and breaches.

“There will be times that you WILL have to manually evaluate the content of packets to identify what they are doing” William Zereneh

One of the projects that I was working on, I had to analyze network traffic using Wireshark in order to extract meaningful information from the…

Natural Language Processing or NLP is a branch of Artificial Intelligence that helps machines to understand humans natural language. Basically, humans communicate with each other majorly in voice or text. So, how does NLP work? Well, one type of data that we can deal with in machine learning is sequential data which is a sequence of data (e.g., text, voice). NLP can build systems that take a sequence of data as an input, process it, and produce another sequence of data. The letter is called sequential model or Seq2seq (sequence (input) to sequence (output)).

In this post, we will explore…

Udacity Data Scientist Program

NLP is a subfield of artificial intelligence that allows machines to manipulate human natural languages. NLP has been exploited in many fields. In this Blog, We will be going through the steps of classifying an email wether it is a spam or not using NLP techniques. But first, let’s start by defining the problem that we are going to try solving in this blog.

Problem Statement

Most of us should be familiar with spam emails. Cisco defines it as unwanted junk email sent out in bulk to an indiscriminate recipient list. Typically, spam is sent for commercial purposes. It can be sent…

Save and Load SK-Learn and Keras ML/DL Models

Saving machine learning (ML) and deep learning (DL) models is an inevitable step in building a ML/DL model to save the state of an object whether for making predictions or reuse it for other purposes when needed.

Serialization (saving) is the process of translating a data structure or object into a format that can be transmitted/stored in a database or file while de-serializing (loading) is the reverse process in which stored objects are loaded from a database or a file.

In this post, you will discover how to save your model using python libraries using SK-Learn and Keras.

1. SK-Learn:

in SK-Learn…

Answering COVID-19 related questions by analyzing dataset worldwide.

There are different types of coronavirus that can infect humans and animals. A novel strain of coronavirus was first detected in December 2019 in Wuhan, China. It was declared as a pandemic by the World Health Organization (WHO) in March 2020. Since then, COVID-19 is controversial and people (including me) did not stop asking questions regarding the novel coronavirus.

In this post, I will try to explore and analyze dataset collected across the world in order to provide answers to the following:

  1. Which countries have the highest total cases/deaths toll?
  2. Is the number of COVID-19 cases correlated with country population?

Meriem Ferdjouni

Software | Industrial Automation Engineer, ML Engineer, Data Scientist. Growing my passion for cybersecurity.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store