Strengthening OT Networks in Critical Infra structure: A Comprehensive Cybersecurity Strategy Leveraging Trojan Hunt India’s Data Diode and Threat Monitoring (InSKIA and OT SOC)

Authors

  • Kunal Sharma Capstone Project by Cohort 6 of the National Cyber Security Scholar Program

Keywords:

OT Security, Cyber Threats, Data Diode, Threat Monitoring, SCADA Security, Critical Infrastructure, InSkia, Trojan Hunt India

Abstract

Operational Technology (OT) networks form the backbone of critical infrastructure, yet they face escalating cybersecurity threats due to growing convergence with IT systems, reliance on legacy technologies, and inadequate protective measures. This capstone explores these vulnerabilities, evaluates recent cyber incidents, and proposes a com prehensive, practical cybersecurity framework integrating Trojan Hunt A India’s Data Diode technology, InSkia Dark Web Monitoring & OT SOC Threat Monitoring. The project highlights weaknesses in traditional f irewalls—particularly their susceptibility to recent remote code ex ecution (RCE) exploits—and underscores the value of physical-layer security and proactive threat monitoring.

References

1. Gartner. Operational Technology [Internet]. Stamford (CT): Gartner, Inc.; [cited 2025 Feb 26]. Avail
able from: https://www.gartner.com/en/information-technology/glossary/operational-technology-ot
2. Trojan Hunt India. Make in India: Data Diode [Internet]. [cited 2025 Mar 22]. Available from: https://tro
janhuntindia.com/makeinindia-datadiode/
3. Trojan Hunt India. inSKIA Dark Web Monitoring [Internet]. [cited 2025 Apr 15]. Available from: https://
trojanhuntindia.com/dark-web-monitoring/

Published

2025-08-18