The development and deployment of tools and systems to protect military computer networks and databases from cyber attacks.