The Intersection of the Semantic Web & Cyber

The Intersection of the Semantic Web & Cyber

The Intersection of the Semantic Web & Cyber

Evolution of web

  • WEB 3.0 (Semantic / Intelligent web)
    Connecting people, information and content. Information is voluminous, heterogeneous and dynamic, readable by machines which retrieve, fuse and analyze it within context
  • Note: WEB 3.0 Relies on linking of machine-generated meta data across web silos, enabling automated agents to more intelligently serve end users
  • WEB 2.0 (Social Web)
    Human involvement is necessary to interpret data. Information is voluminousness and dynamic, scattered across siloed sites. Human improvement is necessary to interpret pages and continue information.
  • WEB 1.0 (World Wide Web)
    Connecting people to information. Information is voluminous but static,digitized / confined in sites and posted for human read-only

Evolution of CYBER

1. CYBER 1.0 (Siloed Cyber)

  • Voluminous, homogeneous information
  • Siloed, on demand non-interactive content
  • Limited number of applications and protocols
  • Resources and missions not fully aligned
  • Manual contextualization of data

2. CYBER 2.0 (Integrated Cyber)

  • Voluminous high velocity data
  • Growth of applications and products
  • People connecting to people to interact with each other and content
  • Human defined approaches and technology to extract and contextualize data
  • Variety of interactions driving looser control (emergence of new threats)

3. CYBER 3.0 (Intelligent Cyber)

  • High volume, velocity and variety of data
  • Explosion in applications and protocols
  • Hyper connected people and content interactively between people
  • Automated alignment of resources with missions
  • Machine learning to extract intelligence and context

Key Features Of Cyber 3.0

  • Automation
    Auto Generation of profiles & cleaning of data
  • Data Fusion
    Merging of disparate data sets
  • Continual¬†Learning
    Increasing resolution on specific targets as more data is collected
  • Compounding
    Increasing breadth of profiles as data accumulates
  • Contextualization
    Increasing linkage between content and context

CYBER Security

    Lack of visibility driven by velocity, volume and data variety and loss of control driven by manual processes for generating threat signatures, defecting anomalies and classifying threats
  • CYBER 3.0
    Machine generated signatures, accurate detection and classification of threats by fusing distinct dimensions ensuring continuous visibility and better control

CYBER Surveillance

    Users do their best to manually “connect the dots” across siloed public & private data sources
  • CYBER 3.0
    Machines automatically “connect-the-dots” compounding user identities and contextualizing every interaction





Leave a Reply

Your email address will not be published. Required fields are marked *