Cyber Operations in an Armed Conflict