EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Evaluation of The 2015 DoD Cyber Strategy

Download or read book Evaluation of The 2015 DoD Cyber Strategy written by Jeffrey L. Caton and published by . This book was released on 2018-02-12 with total page 126 pages. Available in PDF, EPUB and Kindle. Book excerpt: SUMMARYIn 2011, the Department of Defense (DoD) released its Strategy for Operating in Cyberspace, which officially recognized cyberspace as an operational domain akin to the traditional military domains of land, sea, air, and space. This monograph examines the 2015 DoD Cyber Strategy to evaluate how well its five strategic goals and associated implementation objectives define an actionable strategy to achieve three primary mis-sions in cyberspace: defend the DoD network, defend the United States and its interests, and develop cyber capabilities to support military operations. The topic of U.S. Federal cyberspace activities is well-documented in many sources, thus this mono-graph serves as a primer to provide senior policy-makers, decision makers, military leaders, and their respective staffs with an overall appreciation for the complexities, challenges, opportunities, and risks asso-ciated with the development of military cyberspace operations. This report is limited to unclassified and open source information; any classified discussion must occur at another venue. This monograph focuses on events and documents from the period of about 1 year before and 1 year after the 2015 strategy was released. This allows sufficient time to examine the key policies and guidance that influenced the development of the strategy, as well as follow-on activities for the impacts from the strategy. This inquiry has five major sections that utilize differ-ent frameworks of analysis to assess the strategy:1. Prima Facie Analysis: This section is by inten-tion only a superficial overview of the strategy. It explores the strategy and its public face as presented by DoD and addresses: What is the stated purpose of the strategy? What are its con-tent and key messages?2. Historical Context Analysis: The official roots of the DoD cyber strategy go back more than a decade, and this section reviews the docu-ment's contents within the context of other key historical national defense guidance. The sec-tion focuses on two questions: Is this strategy consistent with previous strategies and current policies? What unique contributions does it introduce into the evolution of national security cyberspace activities?3. Traditional Strategy Analysis: This section eval-uates eight specific premises for good strategies that include the familiar elements of ends, ways, means, and risk. It also addresses three ques-tions: Does the strategy properly address spe-cific DoD needs as well as broader U.S. ends? Is the strategy appropriate and actionable? How may joint combatant commanders view the strategy?4. Analysis of Subsequent DoD Action: This section explores the DoD cyber strategy's connections and influences to DoD guidance that followed its release. It will focus on two questions: How are major military cyberspace components--joint and Service--planning to implement the goals and objectives of the DoD cyber strategy? What plans has the Army put in place to sup-port the strategy?5. Whole of U.S. Government Analysis: This sec-tion examines DoD cyber activities from the per-spective of a whole-of-government approach to national cybersecurity. This analysis focuses on two questions: Does the strategy support U.S. Executive direction? Does the strategy inte-grate with other the cyberspace-related activi-ties of other U.S. Government departments and agencies?This monograph concludes with a section that inte-grates the individual section findings and offers rec-ommendations to improve future cyberspace strategic planning documents.

Book An Assessment of the Department of Defense Strategy for Operating in Cyberspace

Download or read book An Assessment of the Department of Defense Strategy for Operating in Cyberspace written by Thomas M. Chen and published by Lulu.com. This book was released on 2014-02 with total page 58 pages. Available in PDF, EPUB and Kindle. Book excerpt: In July 2011, the U.S. Department of Defense (DoD) issued the DoD Strategy for Operating in Cyberspace, which outlines five strategic initiatives: 1) Treat cyberspace as another operational domain; 2) Employ new defense operating concepts to pro--tect DoD networks; 3) Partner with other U.S. government agencies and the private sector; 4) Build relationships with U.S. allies and interna--tional partners to strengthen cyber security; and, 5). Leverage the national intellect and capabilities through cyber workforce training and rapid techno--logical innovation. First, the monograph explores the evolution of cyberspace strategy through a series of government publications leading up to the DoD Strategy for Operating in Cyber--space. It is seen that, although each strategy has differ--ent emphases on ideas, some major themes recur. Second, each strategic initiative is elaborated and critiqued in terms of significance, novelty, and practicality. Third, the monograph critiques the DoD Strategy as a whole.

Book An Assessment of the Department of Defense Strategy for Operating in Cyberspace

Download or read book An Assessment of the Department of Defense Strategy for Operating in Cyberspace written by Thomas M. Chen and published by . This book was released on 2013 with total page 46 pages. Available in PDF, EPUB and Kindle. Book excerpt: In July 2011, the U.S. Department of Defense (DoD) issued the DoD Strategy for Operating in Cyberspace, which outlines five strategic initiatives: 1) Treat cyberspace as another operational domain; 2) Employ new defense operating concepts to protect DoD networks; 3) Partner with other U.S. Government agencies and the private sector; 4) Build relationships with U.S. allies and international partners to strengthen cyber security; and, 5) Leverage national intellect and capabilities through cyber workforce training and rapid technological innovation. First, the monograph explores the evolution of cyberspace strategy through a series of government publications leading up to the DoD Strategy for Operating in Cyberspace. It is seen that, although each strategy has different emphases on ideas, some major themes recur. Second, each strategic initiative is elaborated and critiqued in terms of significance, novelty, and practicality. Third, the monograph critiques the DoD Strategy as a whole. Is it comprehensive and adequate to maintain U.S. superiority in cyberspace against a rapidly changing threat landscape? Shortcomings in the strategy are identified, and recommendations are made for improvement in future versions of the strategy.

Book The Army Role in Achieving Deterrence in Cyberspace

Download or read book The Army Role in Achieving Deterrence in Cyberspace written by Jeffrey L. Caton and published by Independently Published. This book was released on 2019-04-02 with total page 82 pages. Available in PDF, EPUB and Kindle. Book excerpt: In 2015, the Department of Defense (DoD) released the DoD Cyber Strategy which explicitly calls for a comprehensive strategy to provide credible deterrence in cyberspace against threats from key state and nonstate actors. To be effective, such activities must be coordinated with ongoing deterrence efforts in the physical realm, especially those of near-peers impacting critical global regions such as China in the Asia-Pacific region and Russia in Europe. It is important for the U.S. Army to identify and plan for any unique roles that they may provide to these endeavors. This study explores the evolving concept of deterrence in cyberspace in three major areas: - First, the monograph addresses the question: What is the current U.S. deterrence posture for cyberspace? The discussion includes an assessment of relevant current national and DoD policies and concepts as well as an examination of key issues for cyber deterrence found in professional literature.- Second, it examines the question: What are the Army's roles in cyberspace deterrence? This section provides background information on how Army cyber forces operate and examines the potential contributions of these forces to the deterrence efforts in cyberspace as well as in the broader context of strategic deterrence. The section also addresses how the priority of these contributions may change with escalating levels of conflict.- Third, the monograph provides recommendations for changing or adapting the DoD and Army responsibilities to better define and implement the evolving concepts and actions supporting deterrence in the dynamic domain of cyberspace.

Book The Land  Space  and Cyberspace Nexus  Evolution of the Oldest Military Operations in the Newest Military Domains

Download or read book The Land Space and Cyberspace Nexus Evolution of the Oldest Military Operations in the Newest Military Domains written by Jeffrey L. Caton and published by Department of the Army. This book was released on 2018-03-27 with total page 112 pages. Available in PDF, EPUB and Kindle. Book excerpt: Over the last century, the domains of air, space, and cyberspace have joined the traditional warfighting domains of land and sea. While the doctrine for land operations is relatively mature, the doctrine for space and cyberspace continue to evolve, often in an unstructured manner. This monograph examines the relationships among these domains and how they apply to U.S. Army and joint warfighting. It concentrates on the central question: How are U.S. military operations in the newest domains of space and cyberspace being integrated with operations in the traditional domain of land? This inquiry is divided into three major sections: Existing Doctrine: This section presents an overview of the current state of joint and U.S. Army doctrinal development for each of the domains of land, space, and cyberspace. Operations in Multiple Domains: This section examines the concept of cross-domain synergy and its ability to enhance globally integrated operations. Future Operations. This section explores probable future operating environments as well as the resulting implications for U.S. Army and joint force development. It includes recommendations for policymakers and senior leaders regarding the future development and integration of space and cyberspace doctrine. Anticipated future trends favor the decreased emphasis on traditional large-scale land operations and increased frequency and intensity of conflict in space and cyberspace, perhaps even where these newer domains may become preeminent for a given operation. The joint staff's pursuit of achieving cross-domain synergy in planning and operations offers a credible method to face some of the challenges of the future joint force, but this will likely remain an evolutionary vice revolutionary endeavor. Related products: Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications can be found here: https: //bookstore.gpo.gov/products/army-support-military-cyberspace-operations-joint-contexts-and-global-escalation Prism: A Journal of the Center for Complex Operations -print subscription available here: https: //bookstore.gpo.gov/products/prism-journal-center-complex-operations Evolving Army Needs for Space-Based Support available here: https: //bookstore.gpo.gov/products/evolving-army-needs-space-based-support Evaluation of the 2015 DOD Cyber Strategy: Mild Progress in a Complex and Dynamic Military Domain available here: https: //bookstore.gpo.gov/products/evaluation-2015-dod-cyber-strategy-mild-progess-complex-and-dynamic-military-domain Related products:

Book Evaluating U S  and Chinese Cyber Security Strategies Within a Cultural Framework

Download or read book Evaluating U S and Chinese Cyber Security Strategies Within a Cultural Framework written by Diane E. Patton and published by . This book was released on 2016 with total page 20 pages. Available in PDF, EPUB and Kindle. Book excerpt: "With the 2015 release of both an updated United States Department of Defense Cyber Strategy and a Chinese Ministry of National Defense white paper on military strategy, these public documents regarding States' use of cyber technology and objectives for national security offer an insight into deeper military strategy for future security concerns. It is possible to examine the underlying objectives within these strategies to develop a theme for an organization's behavior in the cyber domain. Strategy is shaped by broad cultural dimensions, and this paper discusses two of the existing cultural dimensions theories and proposes three additional dimensions to provide context for organizational and military strategy. Although phrasing this discussion within a State-to-State construct here, it should be noted that strategic culture is not limited to nation-states. Highlighting the variance in cultural dimensions which frame anticipated actions and response sets provides an ability to construct a flexible military response to both state and non-state actors. Therefore, evaluating these individual themes within a cultural framework and how organizations view security in general, provides a broad view of how culture shapes strategy and doctrine, and provides a basis for discussion regarding the flexibility for the United States military to respond to cyber threats across a broad spectrum"--Abstract.

Book Defense Civil Support

    Book Details:
  • Author : United States. Government Accountability Office
  • Publisher : Createspace Independent Publishing Platform
  • Release : 2017-09-23
  • ISBN : 9781977568830
  • Pages : 40 pages

Download or read book Defense Civil Support written by United States. Government Accountability Office and published by Createspace Independent Publishing Platform. This book was released on 2017-09-23 with total page 40 pages. Available in PDF, EPUB and Kindle. Book excerpt: The DOD 2015 Cyber Strategy reported that a cyber attack could present a significant risk to U.S. national security. House Report 114-102 included a provision that GAO assess DOD's plans for providing support to civil authorities for a domestic cyber incident. This report assesses whether (1) the National Guard has developed and DOD has visibility over capabilities that could support civil authorities in a cyber incident; and (2) DOD has conducted and participated in exercises to support civil authorities in cyber incidents and any challenges it faced. GAO recommends that DOD maintain a database that identifies National Guard cyber capabilities, conduct a tier 1 exercise to prepare its forces in the event of a disaster with cyber effects, and address challenges from prior exercises. DOD partially concurred with the recommendations, stating that current mechanisms and exercises are sufficient to address the issues highlighted in the report. GAO believes that the mechanisms and exercises, in their current formats, are not sufficient and continues to believe the recommendations are valid, as described in the report.

Book A Review of U S  Navy Cyber Defense Capabilities

Download or read book A Review of U S Navy Cyber Defense Capabilities written by National Research Council and published by National Academies Press. This book was released on 2015-01-23 with total page 13 pages. Available in PDF, EPUB and Kindle. Book excerpt: In order to conduct operations successfully and defend its capabilities against all warfighting domains, many have warned the Department of Defense (DoD) of the severity of the cyber threat and called for greater attention to defending against potential cyber attacks. For several years, many within and outside DoD have called for even greater attention to addressing threats to cyberspace. At the request of the Chief of Naval Operations, the National Research Council appointed an expert committee to review the U.S. Navy's cyber defense capabilities. The Department of the Navy has determined that the final report prepared by the committee is classified in its entirety under Executive Order 13526 and therefore cannot be made available to the public. A Review of U.S. Navy Cyber Defense Capabilities is the abbreviated report and provides background information on the full report and the committee that prepared it.

Book Cyber Strategy

    Book Details:
  • Author : Brandon Valeriano
  • Publisher : Oxford University Press
  • Release : 2018-04-17
  • ISBN : 0190618108
  • Pages : 321 pages

Download or read book Cyber Strategy written by Brandon Valeriano and published by Oxford University Press. This book was released on 2018-04-17 with total page 321 pages. Available in PDF, EPUB and Kindle. Book excerpt: Some pundits claim cyber weaponry is the most important military innovation in decades, a transformative new technology that promises a paralyzing first-strike advantage difficult for opponents to deter. Yet, what is cyber strategy? How do actors use cyber capabilities to achieve a position of advantage against rival states? This book examines the emerging art of cyber strategy and its integration as part of a larger approach to coercion by states in the international system between 2000 and 2014. To this end, the book establishes a theoretical framework in the coercion literature for evaluating the efficacy of cyber operations. Cyber coercion represents the use of manipulation, denial, and punishment strategies in the digital frontier to achieve some strategic end. As a contemporary form of covert action and political warfare, cyber operations rarely produce concessions and tend to achieve only limited, signaling objectives. When cyber operations do produce concessions between rival states, they tend to be part of a larger integrated coercive strategy that combines network intrusions with other traditional forms of statecraft such as military threats, economic sanctions, and diplomacy. The books finds that cyber operations rarely produce concessions in isolation. They are additive instruments that complement traditional statecraft and coercive diplomacy. The book combines an analysis of cyber exchanges between rival states and broader event data on political, military, and economic interactions with case studies on the leading cyber powers: Russia, China, and the United States. The authors investigate cyber strategies in their integrated and isolated contexts, demonstrating that they are useful for maximizing informational asymmetries and disruptions, and thus are important, but limited coercive tools. This empirical foundation allows the authors to explore how leading actors employ cyber strategy and the implications for international relations in the 21st century. While most military plans involving cyber attributes remain highly classified, the authors piece together strategies based on observations of attacks over time and through the policy discussion in unclassified space. The result will be the first broad evaluation of the efficacy of various strategic options in a digital world.

Book Defense Support to Civil Authorities   Doctrinal Shortfalls During Cyber Attacks   Analysis of DSCA Doctrine and Cyber Threats  Response to Critical Infrastructure Attack During Combat Operations

Download or read book Defense Support to Civil Authorities Doctrinal Shortfalls During Cyber Attacks Analysis of DSCA Doctrine and Cyber Threats Response to Critical Infrastructure Attack During Combat Operations written by U S Military and published by . This book was released on 2019-11-04 with total page 80 pages. Available in PDF, EPUB and Kindle. Book excerpt: As doctrine continues to evolve towards multi-domain battle, the homeland is under increasing risk. In the multi-domain extended battlefield, U.S. reliance on the defense industrial base and strategic lines of communication present adversaries with unique opportunities. At the same time, access to domestic critical infrastructure and key resources in the cyber domain could put the homeland in play in the next war. Efforts to protect the nation's infrastructure in the cyber domain currently remain largely focused on cyber-defense. What if a threat actor successfully penetrated cyber-defenses and impacted critical infrastructure? What would the defense response look like if this attack came during a major combat operation? Would such an attack be defense support to civil authorities (DSCA) or homeland defense (HD), and does it matter? This thesis explores these questions by analyzing the current DSCA doctrine and comparing it to current cyber threats.This compilation also includes a reproduction of the 2019 Worldwide Threat Assessment of the U.S. Intelligence Community.CHAPTER 1 INTRODUCTION * Vulnerability of Critical Infrastructure * Multi-Domain Battle Concept * Problem * Hypothesis * Primary Research Question * Assumptions * Definitions and Terms * Limitations * Delimitations * Conclusion * CHAPTER 2 LITERATURE REVIEW * Introduction * Organization * Groups of Relevant Literature * Cyber-Warfare Theory * Policy * The Purpose of Army Doctrine * Previous Studies on Doctrinal Shortfalls * Current Threats * Summary * CHAPTER 3 RESEARCH METHODOLOGY * Introduction * The Structured What-if Technique (SWIFT) * Advantages * Disadvantages * Bias * Primary Research Question * Secondary Research Questions * Process * Application of SWIFT * Logic Model * Evaluation Criteria * Conclusion * CHAPTER 4 DATA PRESENTATION AND ANALYSIS * Introduction * Hypothesis and Primary Research Question * Secondary Research Questions * SWIFT Process * Doctrinal Context * Modeling Doctrine * Threat Context * Modeling Threat * SWIFT Experiments * Justification * Analysis * Conclusion * CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS * Introduction * Findings * Interpretation * Recommendations * Future Study * Final ThoughtsIn the last decade, CYBERCOM's efforts to protect the nation have contributed greatly to collective cyber-security. Remarkably, the command achieved this capability while also developing the force from nearly nothing. Returning to the hypothetical attack Deputy Secretary Hamre predicted in 1998, how would CYBERCOM manage the consequences of a successful cyber-attack on the nation? Based on existing frameworks, if a threat actor launched cyber-attacks on air traffic control systems and utilities, the Cyber National Mission Force would detect the threat, and in concert with other federal agencies, block the attack. Then CYBERCOM would use offensive capabilities to maneuver and defeat the threat (Department of Defense 2016). This series of actions parallels most of the CBRN response enterprise. However, what part of the cyber-security enterprise takes over if the CYBER NATIONAL MISSION FORCE fails to detect and block an attack? Currently, the management of any impact to critical infrastructure falls within the responsibility of Department of Homeland Security based on the National Response Framework (NRF).

Book Analysis of Department of Defense Social Media Policy and Its Impact on Operational Security   Facebook  Twitter  Instagram  Strengths  Weaknesses  Opportunities  and Threats  SWOT   Terrorism

Download or read book Analysis of Department of Defense Social Media Policy and Its Impact on Operational Security Facebook Twitter Instagram Strengths Weaknesses Opportunities and Threats SWOT Terrorism written by U. S. Military and published by . This book was released on 2017-04-15 with total page 92 pages. Available in PDF, EPUB and Kindle. Book excerpt: This unique book analyzes current DOD social media policy to determine how it can be changed to improve operational security. The emergence and rapid adoption of social media by society has forced the Department of Defense (DOD) to adapt, and ultimately develop and incorporate, social media policy into its cybersecurity strategy. While social media has influenced DOD strategy, it has also had a direct impact on the organization's operational security (OPSEC). DOD personnel using social media represent a potential OPSEC risk through the various ways and means in which they utilize social-networking platforms. In 2009, the DOD responded to this risk, in part, with a policy to regulate the use of social media. This project analyzes current DOD social media policy to determine how it can be changed to improve OPSEC. To address this issue, DOD social media policies from Army Cyber Command, Air Force Cyber Command, Fleet Cyber Command, and Marine Force Cyber Command were analyzed by performing an in-depth review and strengths, weaknesses, opportunities, and threats analysis. CHAPTER I * INTRODUCTION * A. SOCIAL MEDIA AS A STRATEGIC RESOURCE * B. BACKGROUND * C. PURPOSE * D. RESEARCH QUESTIONS * E. SCOPE AND METHODOLOGY * F. ORGANIZATION OF THE STUDY * CHAPTER II * STRATEGIES AND POLICIES * A. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY * B. NATIONAL SECURITY STRATEGY * C. DEPARTMENT OF DEFENSE STRATEGY * 1. Strategic Initiative I * 2. Strategic Initiative II * 3. Strategic Initiative III * 4. Strategic Initiative IV * 5. Strategic Initiative V * D. SOCIAL MEDIA POLICIES * 1. U.S. Strategic Command * 2. DOD Service Policies * CHAPTER III * METHODOLOGY AND ANALYSIS * A. METHODOLOGY * B. ANALYSIS * CHAPTER IV * FINDINGS, SUMMARY, AND RECOMMENDATIONS * A. FINDINGS * B. SUMMARY * 1. Strengths * 2. Weaknesses * 3. Opportunities * 4. Threats * C. RECOMMENDATIONS * 1. Guidance * 2. Oversight * 3. Training * D. AREAS FOR FUTURE RESEARCH

Book U S  Cyber Strategies

Download or read book U S Cyber Strategies written by Maxine Newman and published by . This book was released on 2016 with total page 99 pages. Available in PDF, EPUB and Kindle. Book excerpt: The United States is committed to an open, secure, interoperable, and reliable Internet that enables prosperity, public safety, and the free flow of commerce and ideas. The Internet was not originally designed with security in mind, but as an open system to allow scientists and researchers to send data to one another quickly. Without strong investments in cybersecurity and cyber defenses, data systems remain open and susceptible to rudimentary and dangerous forms of exploitation and attack. Malicious actors use cyberspace to steal data and intellectual property for their own economic or political goals. Governments, companies, and organizations must carefully prioritize the systems and data that they need to protect, assess risks and hazards, and make prudent investments in cybersecurity and cyber defense capabilities to achieve their security goals and objectives. Behind these defense investments, organizations of every kind must build business continuity plans and be ready to operate in a degraded cyber environment where access to networks and data is uncertain. To mitigate risks in cyberspace requires a comprehensive strategy to counter and if necessary withstand disruptive and destructive attacks. The United States' Department of Defense (DoD) is responsible for defending the U.S. homeland and U.S. interests from attack, including attacks that may occur in cyberspace. This book examines the DoD's cyber security strategies; provides US Cyber Command with strategic direction to ensure unity of effort as duties are performed in the service of the nation; and discusses international strategies for cyberspace.

Book Perspective on 2015 DoD Cyber Strategy

Download or read book Perspective on 2015 DoD Cyber Strategy written by Lara Schmidt and published by . This book was released on 2015 with total page 4 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Defense Civil Support

    Book Details:
  • Author : United States Government Accountability Office
  • Publisher : Createspace Independent Publishing Platform
  • Release : 2017-09-23
  • ISBN : 9781977581433
  • Pages : 50 pages

Download or read book Defense Civil Support written by United States Government Accountability Office and published by Createspace Independent Publishing Platform. This book was released on 2017-09-23 with total page 50 pages. Available in PDF, EPUB and Kindle. Book excerpt: 678054

Book The Department of Defense Cyber Strategy

Download or read book The Department of Defense Cyber Strategy written by and published by . This book was released on 2015 with total page 33 pages. Available in PDF, EPUB and Kindle. Book excerpt: In concert with other agencies, the United States' Department of Defense (DoD) is responsible for defending the U.S. homeland and U.S. interests from attack, including attacks that may occur in cyberspace. In a manner consistent with U.S. and international law, the Department of Defense seeks to deter attacks and defend the United States against any adversary that seeks to harm U.S. national interests during times of peace, crisis, or conflict. To this end the Defense Department has developed capabilities for cyber operations and is integrating those capabilities into the full array of tools that the United States government uses to defend U.S. national interests, including diplomatic, informational, military, economic, financial, and law enforcement tools. This new strategy sets prioritized strategic goals and objectives for DoD's cyber activities and missions to achieve over the next five years. It focuses on building capabilities for effective cybersecurity and cyber operations to defend DoD networks, systems, and information; defend the nation against cyberattacks of significant consequence; and support operational and contingency plans. This strategy builds on previous decisions regarding DoD's Cyber Mission Force and cyber workforce development and provides new and specific guidance to mitigate anticipated risks and capture opportunities to strengthen U.S. national security.

Book The DOD Cyber Strategy

    Book Details:
  • Author :
  • Publisher :
  • Release : 2015-05-27
  • ISBN : 9781457868269
  • Pages : 42 pages

Download or read book The DOD Cyber Strategy written by and published by . This book was released on 2015-05-27 with total page 42 pages. Available in PDF, EPUB and Kindle. Book excerpt: The U.S. relies on the Internet and the systems and data of cyberspace for a wide range of critical services, leaving all of us vulnerable in the face of a real and dangerous cyber threat. State and non-state actors plan disruptive and destructive cyberattacks on the networks of our critical infrastructure and aim to steal U.S. intellectual property to undercut our technological and military advantage. The Department of Defense (DOD) is responsible for defending the U.S. from attack, including attacks that may occur in cyberspace. This cyber strategy, DOD's second, focuses on building cyber capabilities and organizations for DOD's three cyber missions: to defend DOD networks, systems, and information; defend the U.S. homeland and U.S. national interests against cyberattacks of significant consequence; and support operational and contingency plans. Figures. This is a print on demand report.