Cyber Vulnerabilities in Critical Infrastructure