What can military history teach us about network security?