Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Narus Cyber 3

Narus Cyber 3

Ratings: (0)|Views: 7|Likes:
Published by Flavio Bernardotti
Narus Cyber 3
Narus Cyber 3

More info:

Published by: Flavio Bernardotti on Aug 21, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/13/2013

pdf

text

original

 
POSITIONING PAPERCYBER 3.0: WHERE THE SEMANTICWEB AND CYBER MEET
JOHN TROBOUGH, PRESIDENT, NARUS, INC.FEBRUARY 2013The term “Cyber 3.0” has been used mostly in reerence tothe strategy described by U.S. Deputy Deense SecretaryWilliam Lynn at an RSA conerence. In his Cyber 3.0strategy, Lynn stresses a ve-part plan as a comprehensiveapproach to protect critical assets. The plan involvesequipping military networks with active deenses, ensuringcivilian networks are adequately protected, and marshalingthe nation’s technological and human resources to maintainits status in cyberspace
1
.Cyber 3.0 technologies will be the key to enable suchprotection, and is achieved when the semantic Web’sautomated, continuous machine learning is applied tocybersecurity and surveillance.Cyber 3.0 will be the oundation or a uture in whichmachines drive decision-making. But Cyber 3.0’s ability todeliver greater
visibility
,
control
and
context
hasar-reaching implications in our current, hyper-connectedenvironment, where massive amounts o inormation moveeasily and quickly across people, locations, time, devicesand networks. It is a world where
human intervention andintelligence
alone simply can’t sit through and analyzeinormation ast enough. Indeed, arming cybersecurityorganizations with the incisive intelligence aorded by thismachine learning means cybersecurity incidents areidentied and security policies are enorced beore criticalassets are compromised.
THE PERFECT STORM: CONFLUENCE OFHYPER-CONNECTIVITY, MOBILITY AND BIG DATA
In order to stress the ull weight o the meaning o Cyber3.0, it is important to rst put the state o our networkedworld into perspective. We can start by stating categoricallythat the Internet is changing: Access, content, andapplication creation and consumption are growingexponentially.From narrowband to broadband, rom kilobits to gigabits,rom talking people to talking things, our networked world ischanging orever. Today, the Internet is hyper-connectingpeople who are now enjoying super-ast connectivityanywhere, anytime and via any device. They are always onand always on the move, roaming seamlessly rom networkto network. Mobile platorms and applications only extendthis behavior. As people use a growing collection o devicesto stay connected (i.e., laptops, tablets, smartphones,televisions), they change the way they work and collaborate,the way they socialize, the way they communicate, and theway they conduct business.Add to this the sheer enormity o digital inormation anddevices that now connect us: Cisco estimates that by 2015,the amount o data crossing the Internet every ve minuteswill be equivalent to the total size o all movies ever made,and that annual Internet trac will reach a zettabyte— roughly 200 times the total size o all words ever spokenby humans
2
. On a similar note, the number o connecteddevices will explode in the next ew years, reaching anastonishing 50 billion by 2020
3
. By this time, connecteddevices could even outnumber connected people by a ratioo 6-to-1
4
. This interconnectedness indeed presents a levelo productivity and convenience never beore seen, but italso tempts ate: The variety and number o endpoints — sodicult to manage and secure — invite cyber breaches, andtheir hyper-connectivity guarantees the spread o cyberincidents as well as a sae hiding place or maliciousmachines and individuals engaged in illegal, dangerous orotherwise unsavory activities.
CYBER 3.0
 
Cyber is nonetheless integral to our everyday lives. Anythingwe do in the cyber world can be eortlessly shited acrosspeople, locations, devices and time. While on one hand,cyber is positioned to dramatically acilitate the process oknowledge discovery and sharing among people (increasingperormance and productivity and enabling asterinteraction), on the other, companies o all sizes must nowsecure terabytes and petabytes o data. That data entersand leaves enterprises at unprecedented rates, and is otenstored and accessed rom a range o locations, such as romsmartphones and tablets, virtual servers, or the cloud.On top o all this, all the aorementioned endpoints havetheir own security needs, and the cybersecurity challengetoday lies in how to control, manage and secure largevolumes o data in increasingly vulnerable and openenvironments. Specically, cybersecurity organizationsneed answers to how they can:
•Ensure
visibility
by keeping pace with theunprecedented and unpredictable progression o newapplications running in their networks
•Retain
control
by staying ahead o the bad guys (or achange), who breach cybersecurity perimeters to stealinvaluable corporate inormation or harm critical assets
•Positionthemselvestobetterdeneandenforce
security policies across every aspect o their network(elements, content and users) to ensure they are alignedwith their mission and gain situational awareness
•Understand
context
and slash the investigation timeand time-to-resolution o a security problem or cyberincidentUnortunately, cybersecurity organizations are impededrom realizing any o these. This is because their currentsolutions require human intervention to manually correlategrowing, disparate data and identiy and manage all cyberthreats.
And human beings just don’t scale.
CYBER 3.0: THE ANSWER TO A NEW GENERATIONOF CYBER CHALLENGES
Indeed, given the great velocity, volume and variety o datagenerated now, the cyber technologies that rely on manualprocesses and human intervention — which worked well inthe past — no longer suce to address cybersecurityorganizations’ current and uture pain points, whichcorrelate directly with the aorementioned confuence ohyper-connectivity, mobility and big data. Rather,next-generation cyber technology that can deliver visibility,control and context
despite
this confuence is the onlyanswer. This technology is achieved by applying machinelearning to cybersecurity and surveillance, and is calledCyber 3.0.In using Cyber 3.0, human intervention is largely removedrom the operational liecycle, and processes, includingdecision-making, are tackled by automation: Data isautomatically captured, contextualized and used at anatomic granularity by smart machines, which thenautomatically connect devices to inormation (extractedrom data) and inormation to people, and then executeend-to-end operational workfows. Workfows are executedaster than ever, and results are more accurate than ever.More and more acts are presented to analysts, who will becalled on only to make a nal decision, rather than to sitthrough massive piles o data in search o hidden orcounter-intuitive answers. And analysts are relieved romtaking part in very lengthy investigation processes tounderstand the ater-the-act root cause.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->