Plenty of vulnerabilities exist
Although there are clear benefits to CPS, serious vulnerabilities have emerged, many of which create opportunities for cyber criminals and carry serious consequences.
When physical devices and systems are connected to one another—whether through cloud services or other internet connections—the data it generates, the functionality, and the solutions provided become vulnerable to potential cyberattacks and malicious activities. Examples of these vulnerabilities include the ‘isolation assumption’ which is based on the false belief that a hidden system is also secure. This is a common practice in modern companies and dangerous approach to cyber security.
Furthermore, with increased connectivity and uniform or similar CPS, both factors can be considered as vulnerabilities. For example, if CPS are connected through a centralised management system, hacking the main system grants access to all connected CPS. Alternatively, if CPS are of the same type but lack centralised management, a common vulnerability exploited in one device could make others equally easy to hack.
Failure to update legacy systems poses serious risks; unfortunately, these weaknesses are compromised regularly around the world. Maintaining legacy systems is, in fact, a major concern for many companies.
For example, in 2017, the WannaCry ransomware attack affected numerous organisations worldwide, including the UK's National Health Service (NHS). The attack targeted a security gap in the Windows operating system and spread rapidly through unpatched systems. The NHS was particularly vulnerable due to its reliance on legacy systems and a lack of adequate cybersecurity measures.