Chapter 4.2: Vulnerabilities of Critical Infrastructure Relating to Violent Attacks