This document discusses the blue economy and cybersecurity issues related to it. The blue economy involves industries like fisheries, energy, shipping, mining, and tourism that rely on coastal and ocean resources. Tanzania is focusing on developing its blue economy by promoting fisheries, energy, tourism, and other coastal industries. However, the increasing use of technology in the blue economy introduces cybersecurity risks, as these systems can face malware, social engineering attacks, denial of service attacks, and other issues. Critical infrastructure and assets in the blue economy like hardware, networks, control systems are targets. This can have financial, reputational and legal impacts. Preventive measures include changing default passwords, training, patching systems, and performing security testing.
2. Who am i
• Kharim Mchatta (CEO)
• Cybersecurity professional
• Author of 4 Cybersecurity books
• Founder of H4K-IT
• Public Speaker
• CybersecurityTrainer
• Blogger
• CTF player
Kenya
• Public Speaking
• Training
• CTF Competition
• Mentor
Tanzania
• Public Speaking
• Training
• CTF Competition
• Digital Forensics
• Penetration Testing
• Curriculum Creation
• Public Speaking
Egypt
• Public Speaking
• Public Speaking
Morocco
Rwanda
• Public Speaking
Nigeria
• Penetration testing
Ghana
• Penetration testing
South Africa
• Penetration testing
Benin
Uganda
• Public Speaking
Experience in Africa
3. Experience in USA & Europe
• Penetration Testing US Department
of Defense
United States of America
UK
• Author at eForensics
Magazine
• Author at PenTest
Magazine
• Penetration testing
( Research Institute)
Poland
Germany
• Subject Matter Expert
(DW Swahili)
4. MIND ROADMAP
Discussion on Blue Economy Blue Tech Economy
Blue economy in Tanzania Cybersecurity in Blue Economy
Effects of Cybersecurity in the
Blue Economy
Counter Measures
5. BLUE
ECONOMY
Blue Economy
What is Blue Economy?
The blue economy activities include the following:
• Fisheries
• Energy
• Shipping
• Mining
• Tourism
• Coastal Protection
6. Blue Economy in Tanzania
InTanzania water resources account for about 37% of the national
region.
In Zanzibar, the 8th government is focused on the blue economy
which aims to promote the following:
• Fisheries, Deep sea fishing, fisheries infrastructure and
related activities
• Economic growth
• Generation of offshore energy
• Improvement of livelihood of Zanzibarians
• Tourism
• Coastal development
• Transport and trade
As a result of this H.E Hussein Mwinyi created the ministry of the
blue economy.This will allowTanzania to develop a sustainable
utilization of its marine, lake and historical resources
7. BLUE
ECONOMY
Blue Economy
A country can develop and grow its economy in various types of
economy like:
• Digital Economy
All these economies have one thing common
• Blue Economy
• Green Economy etc
BLUE
ECONOMY
GREEN
ECONOMY
DIGITAL
ECONOMY
USE OF
TECH
8. BLUE
ECONOMY
Blue Tech Economy
What is blue tech economy?
In the blue economy technology has been a very crucial aspect on
various areas for example
• the use of machine learning.
• The use of 3D imaging cameras and net-cleaning
• Use of robotics in sea diving
As you can seeTechnology has given us a lot of benefits in the blue
economy, but we can’t throw a blind eye on the effects that these
technology come with and that is cyber attacks
9. BLUE
ECONOMY
Cybersecurity in the Blue
Economy
What is Cybersecurity?
Common cyber attacks that affect the blue economy?
What is cyber attacks?
• Malware
• Social Engineering
• Denial of Service
• Password Spraying, Guessing, and use of default credentials
• sniffing communication traffic
• cyber physical attacks (e.g., sabotage, theft, unauthorized access)
11. BLUE
ECONOMY
Cybersecurity in the Blue
Economy
Summary of the Attack
Attacker S.E
Employee
Attacker got access
To VPN
Attacker got access
to a PowerShell Script
And got credentials
Attacker got access
To Internal Network
Attacker Scanned
The network
Attacker got access
to a Privilege Access
Management (PAM)
16. BLUE
ECONOMY
Cybersecurity in the Blue
Economy
How does cybersecurity come into play in the blue economy?
These assets have been the target of cyber attacks
• Hardware endpoints (i.e., operator workstations, services, or
safety instrument systems or protection relays)
• Software
• Computer networks (i.e., routers, switches, gateways,
cellular/satellite, wireless/Bluetooth, MODBUS)
• Communication methods
• Applications
• People
17. BLUE
ECONOMY
Cybersecurity in the Blue
Economy
• Human-machine interface applications (i.e., mobile
devices, physical access controls)
• Field controllers (i.e., programmable logic controllers,
sensors, actuators, intelligent electric device, remote
terminal units)
• Other assets, such as security appliances, test equipment,
peripheral device, or handheld configuration devices
These assets have been the target of cyber attacks Cont…….
18. BLUE
ECONOMY
Cybersecurity in the Blue
Economy
Graphical representation of where cyber attacks occur
MRE - Marine Renewable Energy
MHK - Marine and Hydrokinetic Energy
HMI - Human Machine Interface
19. BLUE
ECONOMY
Cybersecurity in the Blue
Economy
What are the effects of a cyber attack
• Financial Impact
• Reputational Impact
• legal consequences due to data protection and privacy laws
• Loss of data or information
• Services being down due to Denial of Service
20. BLUE
ECONOMY
Cybersecurity in the Blue
Economy
What are the preventive measures of a cyber attack
• Change the default passwords to the systems being used
• Cybersecurity training’s
• Patch software’s
• Perform PenetrationTesting andVulnerability Assessment
22. This intellectual property belongs to HACK IT Consultancy a
cybersecurity company located in Dar es salaam,Tanzania.
Author: Kharim Mchatta
Contact: +255 735 212 145
Email: info@hackitconsultacy.com
Website: www.h4k-it.com
LinkedIn: hack it consultancy Instagram: @hackitconsultancy