DEFENDING CRITICAL INFRASTRUCTURE AS CYBER KEY TERRAIN