Modeling cyber attacks on a critical infrastructure scenario