and prosecution • Secure the mechanisms of the Internet including improving protocols and routing • Foster trusted digital control systems/ supervisory control and data acquisition systems • Reduce and remediate software vulnerabilities • Improve physical security of cyber and telecommunications syste...