The book explores the intersection of cloud-computing, cyber-security, and critical infrastructure protection and simulation technologies. The objective is to develop a simulator that can model cloud computing systems and generate pseudo random cyber-security attacks. The book also explores the information technology concerns, challenges and opportunities in a cloud-centric framework, and develops a strategy for a real-world deployment. The book takes a state of the art perspective, with a core objective of emphasizing the cloud as a neutral framework for critical systems protection which can overcome many of the barriers and limitations of non-cloud based technologies.