SlideShare a Scribd company logo
1 of 22
BLUE ECONOMY
&
CYBERSECURITY
Who am i
• Kharim Mchatta (CEO)
• Cybersecurity professional
• Author of 4 Cybersecurity books
• Founder of H4K-IT
• Public Speaker
• CybersecurityTrainer
• Blogger
• CTF player
Kenya
• Public Speaking
• Training
• CTF Competition
• Mentor
Tanzania
• Public Speaking
• Training
• CTF Competition
• Digital Forensics
• Penetration Testing
• Curriculum Creation
• Public Speaking
Egypt
• Public Speaking
• Public Speaking
Morocco
Rwanda
• Public Speaking
Nigeria
• Penetration testing
Ghana
• Penetration testing
South Africa
• Penetration testing
Benin
Uganda
• Public Speaking
Experience in Africa
Experience in USA & Europe
• Penetration Testing US Department
of Defense
United States of America
UK
• Author at eForensics
Magazine
• Author at PenTest
Magazine
• Penetration testing
( Research Institute)
Poland
Germany
• Subject Matter Expert
(DW Swahili)
MIND ROADMAP
Discussion on Blue Economy Blue Tech Economy
Blue economy in Tanzania Cybersecurity in Blue Economy
Effects of Cybersecurity in the
Blue Economy
Counter Measures
BLUE
ECONOMY
Blue Economy
What is Blue Economy?
The blue economy activities include the following:
• Fisheries
• Energy
• Shipping
• Mining
• Tourism
• Coastal Protection
Blue Economy in Tanzania
InTanzania water resources account for about 37% of the national
region.
In Zanzibar, the 8th government is focused on the blue economy
which aims to promote the following:
• Fisheries, Deep sea fishing, fisheries infrastructure and
related activities
• Economic growth
• Generation of offshore energy
• Improvement of livelihood of Zanzibarians
• Tourism
• Coastal development
• Transport and trade
As a result of this H.E Hussein Mwinyi created the ministry of the
blue economy.This will allowTanzania to develop a sustainable
utilization of its marine, lake and historical resources
BLUE
ECONOMY
Blue Economy
A country can develop and grow its economy in various types of
economy like:
• Digital Economy
All these economies have one thing common
• Blue Economy
• Green Economy etc
BLUE
ECONOMY
GREEN
ECONOMY
DIGITAL
ECONOMY
USE OF
TECH
BLUE
ECONOMY
Blue Tech Economy
What is blue tech economy?
In the blue economy technology has been a very crucial aspect on
various areas for example
• the use of machine learning.
• The use of 3D imaging cameras and net-cleaning
• Use of robotics in sea diving
As you can seeTechnology has given us a lot of benefits in the blue
economy, but we can’t throw a blind eye on the effects that these
technology come with and that is cyber attacks
BLUE
ECONOMY
Cybersecurity in the Blue
Economy
What is Cybersecurity?
Common cyber attacks that affect the blue economy?
What is cyber attacks?
• Malware
• Social Engineering
• Denial of Service
• Password Spraying, Guessing, and use of default credentials
• sniffing communication traffic
• cyber physical attacks (e.g., sabotage, theft, unauthorized access)
BLUE
ECONOMY
Cybersecurity in the Blue
Economy
Example of a recent cyber attack
Uber was hacked through Social Engineering
BLUE
ECONOMY
Cybersecurity in the Blue
Economy
Summary of the Attack
Attacker S.E
Employee
Attacker got access
To VPN
Attacker got access
to a PowerShell Script
And got credentials
Attacker got access
To Internal Network
Attacker Scanned
The network
Attacker got access
to a Privilege Access
Management (PAM)
BLUE
ECONOMY
Cybersecurity in the Blue
Economy
Local Context of Social Engineering: NormalText
BLUE
ECONOMY
Cybersecurity in the Blue
Economy
Local Context of Social Engineering:What's App
BLUE
ECONOMY
Cybersecurity in the Blue
Economy
“You can’t download a patch for human
stupidity”
Kevin Mitnick
BLUE
ECONOMY
Cybersecurity in the Blue
Economy
BLUE
ECONOMY
Cybersecurity in the Blue
Economy
How does cybersecurity come into play in the blue economy?
These assets have been the target of cyber attacks
• Hardware endpoints (i.e., operator workstations, services, or
safety instrument systems or protection relays)
• Software
• Computer networks (i.e., routers, switches, gateways,
cellular/satellite, wireless/Bluetooth, MODBUS)
• Communication methods
• Applications
• People
BLUE
ECONOMY
Cybersecurity in the Blue
Economy
• Human-machine interface applications (i.e., mobile
devices, physical access controls)
• Field controllers (i.e., programmable logic controllers,
sensors, actuators, intelligent electric device, remote
terminal units)
• Other assets, such as security appliances, test equipment,
peripheral device, or handheld configuration devices
These assets have been the target of cyber attacks Cont…….
BLUE
ECONOMY
Cybersecurity in the Blue
Economy
Graphical representation of where cyber attacks occur
MRE - Marine Renewable Energy
MHK - Marine and Hydrokinetic Energy
HMI - Human Machine Interface
BLUE
ECONOMY
Cybersecurity in the Blue
Economy
What are the effects of a cyber attack
• Financial Impact
• Reputational Impact
• legal consequences due to data protection and privacy laws
• Loss of data or information
• Services being down due to Denial of Service
BLUE
ECONOMY
Cybersecurity in the Blue
Economy
What are the preventive measures of a cyber attack
• Change the default passwords to the systems being used
• Cybersecurity training’s
• Patch software’s
• Perform PenetrationTesting andVulnerability Assessment
BLUE
ECONOMY
Any Questions
This intellectual property belongs to HACK IT Consultancy a
cybersecurity company located in Dar es salaam,Tanzania.
Author: Kharim Mchatta
Contact: +255 735 212 145
Email: info@hackitconsultacy.com
Website: www.h4k-it.com
LinkedIn: hack it consultancy Instagram: @hackitconsultancy

More Related Content

Similar to Cybersecurity in the blue economy | 2022

CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023KharimMchatta
 
Cyber Security - CollegeEssay.org - 2024
Cyber Security - CollegeEssay.org - 2024Cyber Security - CollegeEssay.org - 2024
Cyber Security - CollegeEssay.org - 2024CollegeEssay.Org
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)Rohana K Amarakoon
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023KharimMchatta
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Rui Miguel Feio
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
Cybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join NowCybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join Nowasmeerana605
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Rui Miguel Feio
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxMalu704065
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxANA Cyber Security Forensic Pvt. Ltd.
 

Similar to Cybersecurity in the blue economy | 2022 (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023
 
Cyber Security - CollegeEssay.org - 2024
Cyber Security - CollegeEssay.org - 2024Cyber Security - CollegeEssay.org - 2024
Cyber Security - CollegeEssay.org - 2024
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join NowCybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join Now
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 

More from KharimMchatta

Threat Modelling | 2023
Threat Modelling | 2023Threat Modelling | 2023
Threat Modelling | 2023KharimMchatta
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023KharimMchatta
 
Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021KharimMchatta
 
Web app security essentials | 2022
Web app security essentials | 2022Web app security essentials | 2022
Web app security essentials | 2022KharimMchatta
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022KharimMchatta
 
Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022KharimMchatta
 
Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022KharimMchatta
 
Application penetration testing | 2021
Application penetration testing | 2021Application penetration testing | 2021
Application penetration testing | 2021KharimMchatta
 
Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021KharimMchatta
 
Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021KharimMchatta
 
Threat Modelling in Penetration Testing | 2021
Threat Modelling in Penetration Testing  | 2021Threat Modelling in Penetration Testing  | 2021
Threat Modelling in Penetration Testing | 2021KharimMchatta
 
Careers in cybersecurity | 2021
Careers in cybersecurity | 2021Careers in cybersecurity | 2021
Careers in cybersecurity | 2021KharimMchatta
 

More from KharimMchatta (12)

Threat Modelling | 2023
Threat Modelling | 2023Threat Modelling | 2023
Threat Modelling | 2023
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
 
Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021
 
Web app security essentials | 2022
Web app security essentials | 2022Web app security essentials | 2022
Web app security essentials | 2022
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022
 
Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022
 
Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022
 
Application penetration testing | 2021
Application penetration testing | 2021Application penetration testing | 2021
Application penetration testing | 2021
 
Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021
 
Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021
 
Threat Modelling in Penetration Testing | 2021
Threat Modelling in Penetration Testing  | 2021Threat Modelling in Penetration Testing  | 2021
Threat Modelling in Penetration Testing | 2021
 
Careers in cybersecurity | 2021
Careers in cybersecurity | 2021Careers in cybersecurity | 2021
Careers in cybersecurity | 2021
 

Recently uploaded

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Cybersecurity in the blue economy | 2022

  • 2. Who am i • Kharim Mchatta (CEO) • Cybersecurity professional • Author of 4 Cybersecurity books • Founder of H4K-IT • Public Speaker • CybersecurityTrainer • Blogger • CTF player Kenya • Public Speaking • Training • CTF Competition • Mentor Tanzania • Public Speaking • Training • CTF Competition • Digital Forensics • Penetration Testing • Curriculum Creation • Public Speaking Egypt • Public Speaking • Public Speaking Morocco Rwanda • Public Speaking Nigeria • Penetration testing Ghana • Penetration testing South Africa • Penetration testing Benin Uganda • Public Speaking Experience in Africa
  • 3. Experience in USA & Europe • Penetration Testing US Department of Defense United States of America UK • Author at eForensics Magazine • Author at PenTest Magazine • Penetration testing ( Research Institute) Poland Germany • Subject Matter Expert (DW Swahili)
  • 4. MIND ROADMAP Discussion on Blue Economy Blue Tech Economy Blue economy in Tanzania Cybersecurity in Blue Economy Effects of Cybersecurity in the Blue Economy Counter Measures
  • 5. BLUE ECONOMY Blue Economy What is Blue Economy? The blue economy activities include the following: • Fisheries • Energy • Shipping • Mining • Tourism • Coastal Protection
  • 6. Blue Economy in Tanzania InTanzania water resources account for about 37% of the national region. In Zanzibar, the 8th government is focused on the blue economy which aims to promote the following: • Fisheries, Deep sea fishing, fisheries infrastructure and related activities • Economic growth • Generation of offshore energy • Improvement of livelihood of Zanzibarians • Tourism • Coastal development • Transport and trade As a result of this H.E Hussein Mwinyi created the ministry of the blue economy.This will allowTanzania to develop a sustainable utilization of its marine, lake and historical resources
  • 7. BLUE ECONOMY Blue Economy A country can develop and grow its economy in various types of economy like: • Digital Economy All these economies have one thing common • Blue Economy • Green Economy etc BLUE ECONOMY GREEN ECONOMY DIGITAL ECONOMY USE OF TECH
  • 8. BLUE ECONOMY Blue Tech Economy What is blue tech economy? In the blue economy technology has been a very crucial aspect on various areas for example • the use of machine learning. • The use of 3D imaging cameras and net-cleaning • Use of robotics in sea diving As you can seeTechnology has given us a lot of benefits in the blue economy, but we can’t throw a blind eye on the effects that these technology come with and that is cyber attacks
  • 9. BLUE ECONOMY Cybersecurity in the Blue Economy What is Cybersecurity? Common cyber attacks that affect the blue economy? What is cyber attacks? • Malware • Social Engineering • Denial of Service • Password Spraying, Guessing, and use of default credentials • sniffing communication traffic • cyber physical attacks (e.g., sabotage, theft, unauthorized access)
  • 10. BLUE ECONOMY Cybersecurity in the Blue Economy Example of a recent cyber attack Uber was hacked through Social Engineering
  • 11. BLUE ECONOMY Cybersecurity in the Blue Economy Summary of the Attack Attacker S.E Employee Attacker got access To VPN Attacker got access to a PowerShell Script And got credentials Attacker got access To Internal Network Attacker Scanned The network Attacker got access to a Privilege Access Management (PAM)
  • 12. BLUE ECONOMY Cybersecurity in the Blue Economy Local Context of Social Engineering: NormalText
  • 13. BLUE ECONOMY Cybersecurity in the Blue Economy Local Context of Social Engineering:What's App
  • 14. BLUE ECONOMY Cybersecurity in the Blue Economy “You can’t download a patch for human stupidity” Kevin Mitnick
  • 16. BLUE ECONOMY Cybersecurity in the Blue Economy How does cybersecurity come into play in the blue economy? These assets have been the target of cyber attacks • Hardware endpoints (i.e., operator workstations, services, or safety instrument systems or protection relays) • Software • Computer networks (i.e., routers, switches, gateways, cellular/satellite, wireless/Bluetooth, MODBUS) • Communication methods • Applications • People
  • 17. BLUE ECONOMY Cybersecurity in the Blue Economy • Human-machine interface applications (i.e., mobile devices, physical access controls) • Field controllers (i.e., programmable logic controllers, sensors, actuators, intelligent electric device, remote terminal units) • Other assets, such as security appliances, test equipment, peripheral device, or handheld configuration devices These assets have been the target of cyber attacks Cont…….
  • 18. BLUE ECONOMY Cybersecurity in the Blue Economy Graphical representation of where cyber attacks occur MRE - Marine Renewable Energy MHK - Marine and Hydrokinetic Energy HMI - Human Machine Interface
  • 19. BLUE ECONOMY Cybersecurity in the Blue Economy What are the effects of a cyber attack • Financial Impact • Reputational Impact • legal consequences due to data protection and privacy laws • Loss of data or information • Services being down due to Denial of Service
  • 20. BLUE ECONOMY Cybersecurity in the Blue Economy What are the preventive measures of a cyber attack • Change the default passwords to the systems being used • Cybersecurity training’s • Patch software’s • Perform PenetrationTesting andVulnerability Assessment
  • 22. This intellectual property belongs to HACK IT Consultancy a cybersecurity company located in Dar es salaam,Tanzania. Author: Kharim Mchatta Contact: +255 735 212 145 Email: info@hackitconsultacy.com Website: www.h4k-it.com LinkedIn: hack it consultancy Instagram: @hackitconsultancy