In the modern world, ruled by a heavy reliance on technoloy, protecting cyber network systems is very high on the list of importance. Most modern industrial/process/utility systems are controlled by computers linked together through a system of networks, causing the need for ensuring these systems are safe and inaccessible to potential criminal access. These types of systems control most utilities and services you’ll encounter in everyday life, and if they were to be victim of a cyber attack or some type of unauthorized access, the effects could be catastrophic. Among these types of applications include various industries such as energy, agriculture, water services and waste processing, transportation. These industries include pipelines, power distribution, irrigation and livestock management, water distribution and sewage systems, railroads and commercial trucking. All of these industries rely on secure networks and infrastructure to be able to carry out these services that are the basis of modern day life. Because of this, network security alone is not enough, there must be collaboration between network security and the infrastructure that supports these industries. Engineers must brainstorm with network security specialists and others in different divisions to ensure that physical security, network security, and the best infrastructure design, is all taken into account to ensure the most secured systems possible to operate in these important industries and roles. To achieve this, engineers will build the systems with network security in mind, laying a solid foundation for preventing unauthorized access and reducing vulnerabilities that could be exploited. Engineers accomplish this through thorough planning and implantation of SCADA (Site Control and Acquisition) systems. SCADA systems rely on engineers building them to consider network security as they plan and design, however security for industrial control systems is lacking compared to traditional network security. The need for collaboration between all divisions is causing a lack in communication and thus leaving critical systems open to vulnerability. One large vulnerability in SCADA systems is that all traffic is directed through one singular port. This is an advantage due to the ease of tracing traffic and implementing firewalls, but makes it easy for unauthorized individuals to find the devices by scanning the port. Engineers must be informed and forward thinking about the issue of network security as much as physical security.