Modern Methodologies For Securing Ot And Legacy Systems