Quantifying The Influence Of False Data Injection Attacks On Power Supply Adequacy