Endpoint Security

What Steps Can the Military Take to Secure Weapon Systems?