The Intersection of the Semantic Web & Cyber

Evolution of web

  • WEB 3.0 (Semantic / Intelligent web)
    Connecting people, information and content. Information is voluminous, heterogeneous and dynamic, readable by machines which retrieve, fuse and analyze it within context
  • Note: WEB 3.0 Relies on linking of machine-generated meta data across web silos, enabling automated agents to more intelligently serve end users
  • WEB 2.0 (Social Web)
    Human involvement is necessary to interpret data. Information is voluminousness and dynamic, scattered across siloed sites. Human improvement is necessary to interpret pages and continue information.
  • WEB 1.0 (World Wide Web)
    Connecting people to information. Information is voluminous but static,digitized / confined in sites and posted for human read-only

Evolution of CYBER

1. CYBER 1.0 (Siloed Cyber)

  • Voluminous, homogeneous information
  • Siloed, on demand non-interactive content
  • Limited number of applications and protocols
  • Resources and missions not fully aligned
  • Manual contextualization of data

2. CYBER 2.0 (Integrated Cyber)

  • Voluminous high velocity data
  • Growth of applications and products
  • People connecting to people to interact with each other and content
  • Human defined approaches and technology to extract and contextualize data
  • Variety of interactions driving looser control (emergence of new threats)

3. CYBER 3.0 (Intelligent Cyber)

  • High volume, velocity and variety of data
  • Explosion in applications and protocols
  • Hyper connected people and content interactively between people
  • Automated alignment of resources with missions
  • Machine learning to extract intelligence and context

Key Features Of Cyber 3.0

  • Automation
    Auto Generation of profiles & cleaning of data
  • Data Fusion
    Merging of disparate data sets
  • Continual¬†Learning
    Increasing resolution on specific targets as more data is collected
  • Compounding
    Increasing breadth of profiles as data accumulates
  • Contextualization
    Increasing linkage between content and context

CYBER Security

  • TODAY
    Lack of visibility driven by velocity, volume and data variety and loss of control driven by manual processes for generating threat signatures, defecting anomalies and classifying threats
  • CYBER 3.0
    Machine generated signatures, accurate detection and classification of threats by fusing distinct dimensions ensuring continuous visibility and better control

CYBER Surveillance

  • TODAY
    Users do their best to manually “connect the dots” across siloed public & private data sources
  • CYBER 3.0
    Machines automatically “connect-the-dots” compounding user identities and contextualizing every interaction

 

cyber-3-0-the-intersection-of-the-semantic-web-cyber

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *