Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection