National security is being redefined by cyberspace. In addition to
opportunities, DoD faces significant cyberspace challenges. The
Department’s military, intelligence, and business operations all depend
upon cyberspace for mission success. The Department of Defense Strategy
for Operating in Cyberspace assesses these challenges and opportunities
and sets a strategic approach for DoD’s cyber mission.

The Department’s five strategic initiatives offer a roadmap for DoD to
operate effectively in cyberspace, defend national interests, and
achieve national security objectives. Each initiative is distinct, yet
necessarily connected with the other four. Across the strategy,
activities undertaken in one initiative will contribute to DoD’s
strategic thinking and lead to new approaches in the others.

By pursuing the activities in this strategy, DoD will capitalize on the
opportunities afforded to the Department by cyberspace; defend DoD
networks and systems against intrusions and malicious activity; support
efforts to strengthen cybersecurity for interagency, international, and
critical industry partners; and develop robust cyberspace capabilities
and partnerships.

This strategy will guide the Department’s defense of U.S. interests in
cyberspace so that the United States and its allies and partners may
continue to benefit from the innovations of the information age.

*

BD particularly likes this paragraph:-


"The potential for small groups to have an asymmetric impact in
cyberspace creates very real incentives for malicious activity. Beyond
formal governmental activities, cyber criminals can control botnets with
millions of infected hosts.

The tools and techniques developed by cyber criminals are increasing in
sophistication at an incredible rate, and many of these capabilities can
be purchased cheaply on the Internet. Whether the goal is monetary,
access to intellectual property, or the disruption of critical DoD
systems, the rapidly evolving threat landscape presents a complex and
vital challenge for national and economic security."

*

Read the complete report, here:-

http://www.defense.gov/news/d20110714cyber.pdf