POSITIONING PAPERCYBER 3.0: WHERE THE SEMANTICWEB AND CYBER MEET
JOHN TROBOUGH, PRESIDENT, NARUS, INC.FEBRUARY 2013The term “Cyber 3.0” has been used mostly in reerence tothe strategy described by U.S. Deputy Deense SecretaryWilliam Lynn at an RSA conerence. In his Cyber 3.0strategy, Lynn stresses a ve-part plan as a comprehensiveapproach to protect critical assets. The plan involvesequipping military networks with active deenses, ensuringcivilian networks are adequately protected, and marshalingthe nation’s technological and human resources to maintainits status in cyberspace
.Cyber 3.0 technologies will be the key to enable suchprotection, and is achieved when the semantic Web’sautomated, continuous machine learning is applied tocybersecurity and surveillance.Cyber 3.0 will be the oundation or a uture in whichmachines drive decision-making. But Cyber 3.0’s ability todeliver greater
hasar-reaching implications in our current, hyper-connectedenvironment, where massive amounts o inormation moveeasily and quickly across people, locations, time, devicesand networks. It is a world where
human intervention andintelligence
alone simply can’t sit through and analyzeinormation ast enough. Indeed, arming cybersecurityorganizations with the incisive intelligence aorded by thismachine learning means cybersecurity incidents areidentied and security policies are enorced beore criticalassets are compromised.
THE PERFECT STORM: CONFLUENCE OFHYPER-CONNECTIVITY, MOBILITY AND BIG DATA
In order to stress the ull weight o the meaning o Cyber3.0, it is important to rst put the state o our networkedworld into perspective. We can start by stating categoricallythat the Internet is changing: Access, content, andapplication creation and consumption are growingexponentially.From narrowband to broadband, rom kilobits to gigabits,rom talking people to talking things, our networked world ischanging orever. Today, the Internet is hyper-connectingpeople who are now enjoying super-ast connectivityanywhere, anytime and via any device. They are always onand always on the move, roaming seamlessly rom networkto network. Mobile platorms and applications only extendthis behavior. As people use a growing collection o devicesto stay connected (i.e., laptops, tablets, smartphones,televisions), they change the way they work and collaborate,the way they socialize, the way they communicate, and theway they conduct business.Add to this the sheer enormity o digital inormation anddevices that now connect us: Cisco estimates that by 2015,the amount o data crossing the Internet every ve minuteswill be equivalent to the total size o all movies ever made,and that annual Internet trac will reach a zettabyte— roughly 200 times the total size o all words ever spokenby humans
. On a similar note, the number o connecteddevices will explode in the next ew years, reaching anastonishing 50 billion by 2020
. By this time, connecteddevices could even outnumber connected people by a ratioo 6-to-1
. This interconnectedness indeed presents a levelo productivity and convenience never beore seen, but italso tempts ate: The variety and number o endpoints — sodicult to manage and secure — invite cyber breaches, andtheir hyper-connectivity guarantees the spread o cyberincidents as well as a sae hiding place or maliciousmachines and individuals engaged in illegal, dangerous orotherwise unsavory activities.