Strategies for cyberspace have focused primarily on the consequences of operations “in” and “with” cyberspace. These discussions, typically centered on cyberwar or cyberwarfare, presume access to cyberspace to be present, resilient, and adequate for military operations.