Vulnerabilities, Attacks and Equilibria in Information Infrastructure