and control of forces, real-time provision of intelligence, and remote operations. Every one ofthese functions depends heavily on the military's global communications backbone, whichconsists of thousands of networks and millions of computing devices across hundreds of militaryposts in dozens of countries (Lynn, 2014).In less than a generation, information technology has evolved within the confounds of the U.Smilitary from the applications of administrative tool to enhancing force productivity into anational strategic asset in its own right. The U.S. military’s digital infrastructure now gives theUnited States critical advantages over any adversary. However, its reliance on such advanceconnectivity may also be a potential hazard that enables adversaries to gain valuable intelligenceabout its capabilities and operations. These hazards may impede its kinetic forces and disrupt thehealth and social economic development. Specifically, cyberwarfare is asymmetric, the low costof computing devices means that U.S. adversaries do not have to build expensive weapons, suchas stealth fighters or aircraft carriers, to pose a significant threat to its military capabilities.Indeveloping a strategy to counter these dangers, the USCYBERCOM is focusing on attributes ofthe cyberthreat by providing protection of all defense networks and supports and