those necessary to conduct computer network attacks.”.