When working with SCADA (Supervisory control and data acquisition) systems, it is important to note what they exactly are. SCADA systems are centralized systems that control and monitor the entire sites, or they are complex systems spread out over large areas. An example of a SCADA system implementation would be alarm systems. SCADA systems also are present in certain subsystems such as Remote Terminal Units (RTUs), Programmable Logic Controller (PLCs) and many more. With all the technology that implements SCADA systems they are targets for cyberterrorism/cyberwarfare attacks. There is a false sense of security with SCADA systems. It is a widespread belief to think SCADA systems are secure because they secure physically and that they are disconnected from the internet. There are major vulnerabilities when dealing with SCADA systems. The first one is unauthorized access to software, be it human access or intentionally induced changes, virus infections, or other problems that can affect the control host machine (SCADA Systems. n.d.). The second threat is related to packet access to network segments that host SCADA devices (SCADA Systems. n.d.). In most security related issues with SCADA systems there is little to no security when transferring packets; therefore, any person sending packets to a SCADA device can control it. SCADA users say that when you transfer packets using a VPN (Virtual Private Network) it is a substantial way to protect your data. This is fallacy SCADA systems have that physical access to network switches and jacks related to SCADA provides the capacity to bypass the security on control software and control SCADA networks. According to, www.scadasystems.net SCADA vendors developing specialized industrial VPN and security system solutions for SCADA networks. These VPNs will have TCP/IP basis. Also, whitelisting solutions have been implemented due to their ability to prevent unauthorized application changes (SCADA Systems. N.d.).