When Cyber Got Real: Challenges in Securing Cyber-Physical Systems