Abstract :
Defense of cyberspace is challenging. The seemingly endless breadth of cyberspace coupled with the technological depth of its composition can divide defensive approaches to be either overarching or highly specific. In order to abstract away details for the purpose of tractability, overarching approaches can suffer because simplistic models for threats, vulnerabilities, and exploits tend to yield defenses that are too optimistic. Approaches that deal with specific threats, vulnerabilities and exploits may be more credible but can quickly lose their meaningfulness as technology changes. Whether approaches are near-or-far term, there are two underlying attributes remain essential: the ability to survive and the ability to fight through.