Handbook on Securing Cyber-Physical Critical Infrastructure door