[MUSIC] Let us look at some credible sources to determine the gravity of the IP threat situation. According to the Data Breach Investigation Report by Verizon, out of the 750 cyber incidents they monitored in the manufacturing sector in 2016, 125 incidents where cases of data breach. Out of this, the major types of attacks were cyber espionage and insider privilege misuse. About 90% of the data breaches were due to external attacks. Another 10% were due to insiders. When so much IP is available in certain manufacturing organizations, and when you don't have the resources to create your own, it is no surprise that cyber espionage is the primary pattern associated with breaches, according to the Verizon report. So it is very important that computer security should be studied as a close subject when we talk about digital manufacturing and design. The rest of this lesson, let us try to familiarize ourselves with the basic concepts of computer security. We start with some key terminologies. First, what is computer security? There are three major components in a digital system which need to be protected, hardware, software, and data. Each of these components is highly valuable for a system. The security of the system can be analyzed by testing it against some attack models. In this model, we can insure that our security system is not vulnerable to attacks by unauthorized parties and the assets are well-protected. At the same time, they must ensure that legitimate users have access to the assets. Second, what is system vulnerability? By the term vulnerability, we mean the weaknesses of a digital system. For example, in procedures, design or implementation, there might be some security loopholes which may be exploited by unauthorized users to cost loss or harm. Third, what is system threat? A threat in computer security that forced to circumstances or actions, it can cost loss or harm to the system. For example, in a system, denial of service by simply flooding the system with merely fake requests and causing system resource exhaustion, could be viewed as a real threat. Let's conclude this introductory lesson by listing some of the challenges in securing the IP. Which is the most critical component of DMD. These are, one, providing protection against network monitoring and traffic analysis. The communication network of the organization should be safe and protected from any outside packet monitoring, or network analysis attack. This is not always easy especially when wireless networking and communication are involved. Two, dealing with insider attacks. An organization should maintain signed legal papers from dealers and employees to prevent any information theft, or leakage, from inside of organization's network, but this alone will not be sufficient, and some complementary technical mechanisms should be in place. A challenge here is how to implement such measures. Monitoring employees surreptitiously, for example, may send wrong signals of distrust between the management and the employees. Three, cost of designing security. The security infrastructure should be designed according to the companies asset value, high-security means high cost. This could be a challenge for small scale industries. Four, security monitoring. Security systems require regular and consistent monitoring and this is difficult in today's short-term [INAUDIBLE].