CYBER 3.0                                                                                   The Intersection of the
                                                                                            Semantic Web & Cyber
                                                                                            WEB 3.0
                                       WEB 2.0                                              SEMANTIC/INTELLIGENT WEB
                                       SOCIAL WEB                                           Connecting people, information and content. Information is
                                                                                            voluminous, heterogeneous and dynamic, readable by machines
                                       Human involvement is necessary to
                                                                                            which retrieve, fuse and analyze it within context.
                                       interpret data. Information is voluminous,
                                       heterogeneous and dynamic, scattered
                                       across siloed sites. Human involvement
                                       is necessary to interpret pages and
                                       combine information.



WEB 1.0
WORLD WIDE WEB                                                                                                                             Web 3.0 relies on linking
Connecting people to information.                                                                                                          of machine-generated
Information is voluminous but                                                                                                              metadata across web
static, digitized/confined in sites
                                                                                                                                           siloes, enabling
and posted for human read-only.
                                                                                                                                           automated agents to
                                                                                                                                           more intelligently serve
                                                                CYBER SECURITY                                                             end-users

                                                        TODAY                               CYBER 3.0
                                                        Lack of visibility driven by
                                                        velocity, volume and data
                                                                                            Machine generated                             KEY FEATURES
                                                                                            signatures, accurate
                                                        variety, and loss of control        detection and                                 OF CYBER 3.0
Evolution of                                            driven by manual processes          classification of threats                        Automation


WEB
                                                        for generating threat               by fusing distinct                              Auto Generation of Profiles
                                                        signatures, detecting               dimensions ensuring                             & Chaining of Data
                                                        anomalies and classifying           continuous visibility
                                                        threats                             and better control                              Data Fusion
                                                                                                                                            Merging of disparate data sets


Evolution of                                               CYBER SURVEILLANCE                                                               Continual Learning
                                                                                                                                            Increasing resolution on specific




CYBER
                                                                                                                                            targets as more data is collected
                                                        TODAY                               CYBER 3.0
                                                        Users do their best to              Machine automatically                           Compounding
                                                        manually “connect the               “connect-the-dots”                              Increasing breadth of
                                                                                                                                            profiles as data accumulates
                                                        dots” across siloed                 compounding user
                                                        public & private                    identities and
                                                                                            contextualizing every
                                                                                                                                            Contextualization
                                                        data sources                                                                        Increasing linkage between
                                                                                            interaction                                     content and context




CYBER 1.0
SILOED CYBER
• Voluminous, homogenous information
• Siloed, on demand non-interactive content
• Limited number of applications and protocols
• Resources and missions not fully aligned
• Manual contextualization of data
                                                        CYBER 2.0                                                      CYBER 3.0
                                                        INTERGRATED CYBER                                              INTELLIGENT CYBER
                                                        • Voluminous high velocity data                                • High volume, velocity and variety of data
                                                        • Growth of applications and protocols                         • Explosion in applications and protocols
                                                        • People connecting to people to interact with each            • Hyper connected people and content,
                                                          other and content                                              interactivity between, people-machines-
                                                        • Human defined approaches and technology to                      machines-people
                                                          extract and contextualize data                               • Automated alignment of resources
                                                        • Variety of interactions driving looser control                 with missions
                                                          (emergence of new threats)                                   • Machine learning to extract intelligence
                                                                                                                         and context
© NARUS INC. 2013

Narus cyber 3 0 infographict_lowres

  • 1.
    CYBER 3.0 The Intersection of the Semantic Web & Cyber WEB 3.0 WEB 2.0 SEMANTIC/INTELLIGENT WEB SOCIAL WEB Connecting people, information and content. Information is voluminous, heterogeneous and dynamic, readable by machines Human involvement is necessary to which retrieve, fuse and analyze it within context. interpret data. Information is voluminous, heterogeneous and dynamic, scattered across siloed sites. Human involvement is necessary to interpret pages and combine information. WEB 1.0 WORLD WIDE WEB Web 3.0 relies on linking Connecting people to information. of machine-generated Information is voluminous but metadata across web static, digitized/confined in sites siloes, enabling and posted for human read-only. automated agents to more intelligently serve CYBER SECURITY end-users TODAY CYBER 3.0 Lack of visibility driven by velocity, volume and data Machine generated KEY FEATURES signatures, accurate variety, and loss of control detection and OF CYBER 3.0 Evolution of driven by manual processes classification of threats Automation WEB for generating threat by fusing distinct Auto Generation of Profiles signatures, detecting dimensions ensuring & Chaining of Data anomalies and classifying continuous visibility threats and better control Data Fusion Merging of disparate data sets Evolution of CYBER SURVEILLANCE Continual Learning Increasing resolution on specific CYBER targets as more data is collected TODAY CYBER 3.0 Users do their best to Machine automatically Compounding manually “connect the “connect-the-dots” Increasing breadth of profiles as data accumulates dots” across siloed compounding user public & private identities and contextualizing every Contextualization data sources Increasing linkage between interaction content and context CYBER 1.0 SILOED CYBER • Voluminous, homogenous information • Siloed, on demand non-interactive content • Limited number of applications and protocols • Resources and missions not fully aligned • Manual contextualization of data CYBER 2.0 CYBER 3.0 INTERGRATED CYBER INTELLIGENT CYBER • Voluminous high velocity data • High volume, velocity and variety of data • Growth of applications and protocols • Explosion in applications and protocols • People connecting to people to interact with each • Hyper connected people and content, other and content interactivity between, people-machines- • Human defined approaches and technology to machines-people extract and contextualize data • Automated alignment of resources • Variety of interactions driving looser control with missions (emergence of new threats) • Machine learning to extract intelligence and context © NARUS INC. 2013