The techniques used in real-world combat apply in cybersecurity operations, except that instead of bullets flying downrange, it’s packets.