Qualitative Reasoning about Cyber Intrusions