When countries design their cyber defense strategies, they do so on the premise that they can defend against malicious cyber operations only after the impacts of such acts materialize. Instead of ...