Chapter 4.1: Vulnerabilities of Critical Infrastructure Relating to Violent Attacks