Actions normally created within DoD cyberspace for securing, operating, and defending the DoD information networks. Specific actions include protect, detect, characterize, counter, and mitigate.
Source(s):
CNSSI 4009-2015
from
DoDI 8500.01