Hi, everyone, Ed Amoroso here. And in this sort of part one video, I want to spend some time talking to you about Critical Infrastructure. In a subsequent video, part two, I'll talk to you about kind of how we protect it. But in this one, I'm going to kind of introduce the idea of how something becomes, in some sense, designated as critical. Now, a good definition of criticality for any type of asset, would be that, if we removed, that asset then makes the intended mission impossible to accomplish. Like in your car you'd say what are critical assets in your car? Well, you'd say, what's the mission of my car? It's to get me from point a to point b safely and reasonably comfortably. So you'd say well, would the four wheels be considered critical assets in the car? [LAUGH] You bet they are. Car is not going anywhere without four wheels. But you could say, what about the stickers that I put on the outside of my car, is that critical? Probably not, if somebody puts a magnetic sticker and somebody peels it off, the car still works just fine. You're not happy maybe you like that sticker and maybe somebody stole it, but it's certainly not critical or essential to the proper mission or operation of that car. Now, when we apply that concept, that critically measure to infrastructure, here's what we come up with. Come up with the idea that we're going to say, okay, critical infrastructure sectors, or components, would be those sectors or components, which, if removed, have a pretty negative influence or negative impact on society, okay? So we'll go through 16 examples, just briefly, to give the idea. So first, is agriculture and food. Clearly, if somebody affects that, then there's going to be an impact on a population. Might be starvation, potentially so to the degree that that's connected to the Internet, that there are systems that control that crop output, monitoring things. That could be pretty dangerous, if somebody's tampering with that. Banking and financial services, I shouldn't even have to explain that's obvious that if people tamper with that, that's a mess. Chemical, certainly a big industry in many countries, manufacturing and using chemicals for certain types of things. The reason that's consequential is, because, if people get their hands on that stuff, they can cause certain types of attacks and all sorts of bad consequences occur. If very dangerous chemicals are made available to people who are irresponsible or who want to bring some harm so that's an important one. Commercial Facilities, like stores and the ability to go into a grocery store and buy things. You certainly want commerce to be proceeding. If commerce is impeded or interrupted, you potentially have some problems and they're all connected to Internet now. Like the supply chain for a typical grocery store here in the United States, is so efficient that the amount of material, the stuff that's put on our shelves, turns over very quickly. So that if there was a problem, if the supply chain were impeded through cyber attack, then the shelves could become very barren, very, very quickly. It's surprising how quickly that can occur so, certainly that's important. Communications, telecommunications, our mobile, our ability to connect to Internet, is essential to the proper operations of a society. Dams, keeping certain regions safe. Those are all controlled electronically, and hackers, in many cases, might target that to cause some very negative consequences to the people who certainly live in the path of the dam. Defense, obvious, military is all based on cyber to some degree. I don't care what you're talking about, there's a computing component, there is a networking component to almost all aspects of the way we do defense and military. Emergency Services, 911, here, in the United States, wherever it is where you are, if you're calling for an ambulance or calling for emergency service, you want that service to becoming very quickly. You don't want that to be impeded by hackers. Energy might be the most obvious of all the power goes out, you've got a problem. Here, in our studio, at NYU, in New York City, the power goes out here, we got a big problem doing this video. We'd have to find a way to do it in another time, things just can't proceed without power. It maybe the most fundamental things to life, nowadays, beyond, say, water and air [LAUGH], and food, power, in some sense, may be just as important. Government facilities, we all need to be governed. We'd have crazy chaos, if we didn't have some way of organizing ourselves. So to the degree that hackers tried impede government activity, causes a problem. Healthcare, certainly the case, I mean a hospital, it's in the mists of some operation, some complex operation, where if the operation were interrupted in the middle, the patient would die. You need continuity of power, continuity of safety, and the ability to continue to work through something like that. And, certainly, just with a lot of folks who are recovering or who are ill, who need the quiet and the respite and the safety of the hospital. You don't want that to be interrupted by cyber attacks. IT is the backbone for all business so if IT systems are impeded or interrupted, it affects commerce it affects our ability to do all sorts of things. Nuclear materials and waste, and nuclear energy, and anything having to do with nuclear reactors. Certainly a big target, if somebody were to create a destructive attack to something like that, it would have consequences for people who live in that region. Transportation system, pretty obvious that the way the flow of transportation, whether air or ground, is essential to a society. Certainly needs to be free of cyber attack. Water, wastewater, again, absolutely essential for life. And sometimes you forget how important it is for waste to be properly managed and handled in a society. And these things are generally the flow of wastewater and other things, is all done in and around computing and networking. And, finally, Critical Manufacturing. The ability to build and to create things that we need in our society. You don't want that sort of thing impeded. So these are the good example, these are 16 sectors that, for the most part, I think correspond to the kinds of things that a typical society would not want to have attacked by cyber. So this has been part one, to introduce to you the kinds of requirements that we have in and around critical infrastructure. In part two of our video, I'll introduce you to some of the types of things that we do to protect critical infrastructures. So, I hope this is been useful, I'll see you in the next one.