CYBER 3.0 The Intersection of the ...
of 1

Narus cyber 3 0 infographict_lowres

The Future of Cyber Security
Published on: Mar 3, 2016
Published in: Technology      

Transcripts - Narus cyber 3 0 infographict_lowres

  • 1. CYBER 3.0 The Intersection of the Semantic Web & Cyber WEB 3.0 WEB 2.0 SEMANTIC/INTELLIGENT WEB SOCIAL WEB Connecting people, information and content. Information is voluminous, heterogeneous and dynamic, readable by machines Human involvement is necessary to which retrieve, fuse and analyze it within context. interpret data. Information is voluminous, heterogeneous and dynamic, scattered across siloed sites. Human involvement is necessary to interpret pages and combine information.WEB 1.0WORLD WIDE WEB Web 3.0 relies on linkingConnecting people to information. of machine-generatedInformation is voluminous but metadata across webstatic, digitized/confined in sites siloes, enablingand posted for human read-only. automated agents to more intelligently serve CYBER SECURITY end-users TODAY CYBER 3.0 Lack of visibility driven by velocity, volume and data Machine generated KEY FEATURES signatures, accurate variety, and loss of control detection and OF CYBER 3.0Evolution of driven by manual processes classification of threats AutomationWEB for generating threat by fusing distinct Auto Generation of Profiles signatures, detecting dimensions ensuring & Chaining of Data anomalies and classifying continuous visibility threats and better control Data Fusion Merging of disparate data setsEvolution of CYBER SURVEILLANCE Continual Learning Increasing resolution on specificCYBER targets as more data is collected TODAY CYBER 3.0 Users do their best to Machine automatically Compounding manually “connect the “connect-the-dots” Increasing breadth of profiles as data accumulates dots” across siloed compounding user public & private identities and contextualizing every Contextualization data sources Increasing linkage between interaction content and contextCYBER 1.0SILOED CYBER• Voluminous, homogenous information• Siloed, on demand non-interactive content• Limited number of applications and protocols• Resources and missions not fully aligned• Manual contextualization of data CYBER 2.0 CYBER 3.0 INTERGRATED CYBER INTELLIGENT CYBER • Voluminous high velocity data • High volume, velocity and variety of data • Growth of applications and protocols • Explosion in applications and protocols • People connecting to people to interact with each • Hyper connected people and content, other and content interactivity between, people-machines- • Human defined approaches and technology to machines-people extract and contextualize data • Automated alignment of resources • Variety of interactions driving looser control with missions (emergence of new threats) • Machine learning to extract intelligence and context© NARUS INC. 2013

Related Documents