What would a cyber attack look like in the real world?