As stated in the article SCADA Systems, “Security of SCADA-based systems is being questioned, as they are potential targets to cyberterrorism/cyberwarfare attacks.” Though SCADA is an excellent system to use in the cybersecurity field, it has many vulnerabilities and risks. The first vulnerability could be that the system could be threatened by virus infections, manufactured viruses, or induced changes. The second vulnerability to the system could be that there remains less or no security on actual packet control protocol; therefore, any person sending packets to a SCADA device is in a position to control it. The SCADA systems are also prone to breaches in security when the systems are connected to other networks. By the method being connected to other networks, attackers could hack into the system, take critical knowledge of how the SCADA networks operate and gain new information. The following vulnerability could be that the hardware known as cots that develops software and operating systems may not be secure enough for the network. When problems are found in the operating systems, it could sometimes be impossible to fix them. Any devices created by cots that may have problems could be seen as a vulnerability to cybercriminals. If any of the devices are supposed to have a failsafe mechanism, the criminals could easily be disabled and breach the network. To overcome these problems, the first step to take is to develop new security measures. When it comes to security measures, there should be policies designed for each specific operating system. Next, there needs to be buffed up security awareness of who can access detailed information in organizations. Lastly, firewalls and VPNs could be developed for the networks.