“…Using such a point of view, a situation assessment can be realized considering several technological and organizational aspects and using techniques and methods specific to each facility. In the following Sections, some particular events/infrastructures will be described/analysed to better understand the holistic impact evaluation: • Management of alarms, usually collected using SCADA (Supervisory Control And Data Acquisition) software and then shown to operators in order to support decisions; • Management of physical security information, for detecting unauthorized accesses to specific areas, also using data mining algorithms; • Evaluation of the Quality of Services (QoS) toward customers of the infrastructure, using simulators for analysing transients and outages after the fault [4,5], such as load-flow simulation for power grids or NS-2 [5], OMNET++ [27] and Netbed [29] for telecommunication networks; • Detection/spreading of cyber-attacks [1,3,6,18,23,25,30], especially worms and viruses spreading, such as Red-Code [32], Stuxnet [10] or Duqu [28] worm, through mathematical representation, such as the two-factor models; • Use of information coming from international and national agencies, such as CERTs and other institutions, to integrate cyber-related data coming out from other infrastructures.…”