How to Manage a Cyber-Attack from a Communications Perspective