The Intersection of the Semantic Web & Cyber
The Intersection of the Semantic Web & Cyber
Evolution of web
- WEB 3.0 (Semantic / Intelligent web)
Connecting people, information and content. Information is voluminous, heterogeneous and dynamic, readable by machines which retrieve, fuse and analyze it within context - Note: WEB 3.0 Relies on linking of machine-generated meta data across web silos, enabling automated agents to more intelligently serve end users
- WEB 2.0 (Social Web)
Human involvement is necessary to interpret data. Information is voluminousness and dynamic, scattered across siloed sites. Human improvement is necessary to interpret pages and continue information. - WEB 1.0 (World Wide Web)
Connecting people to information. Information is voluminous but static,digitized / confined in sites and posted for human read-only
Evolution of CYBER
1. CYBER 1.0 (Siloed Cyber)
- Voluminous, homogeneous information
- Siloed, on demand non-interactive content
- Limited number of applications and protocols
- Resources and missions not fully aligned
- Manual contextualization of data
2. CYBER 2.0 (Integrated Cyber)
- Voluminous high velocity data
- Growth of applications and products
- People connecting to people to interact with each other and content
- Human defined approaches and technology to extract and contextualize data
- Variety of interactions driving looser control (emergence of new threats)
3. CYBER 3.0 (Intelligent Cyber)
- High volume, velocity and variety of data
- Explosion in applications and protocols
- Hyper connected people and content interactively between people
- Automated alignment of resources with missions
- Machine learning to extract intelligence and context
Key Features Of Cyber 3.0
- Automation
Auto Generation of profiles & cleaning of data - Data Fusion
Merging of disparate data sets - Continual Learning
Increasing resolution on specific targets as more data is collected - Compounding
Increasing breadth of profiles as data accumulates - Contextualization
Increasing linkage between content and context
CYBER Security
- TODAY
Lack of visibility driven by velocity, volume and data variety and loss of control driven by manual processes for generating threat signatures, defecting anomalies and classifying threats - CYBER 3.0
Machine generated signatures, accurate detection and classification of threats by fusing distinct dimensions ensuring continuous visibility and better control
CYBER Surveillance
- TODAY
Users do their best to manually “connect the dots” across siloed public & private data sources - CYBER 3.0
Machines automatically “connect-the-dots” compounding user identities and contextualizing every interaction