Protection of Multiple Assets to Intentional Attacks: A Methodological Framework