Exploring varieties of cyber operational engagements