1 / 30

Remote Access Virtual Environment (RAVE) A VPN Knowledge Grid

Remote Access Virtual Environment (RAVE) A VPN Knowledge Grid. Joseph A. Sprute, Founder/Principal 33 Westbury Dr. Bella Vista, Arkansas 72714 479-876-6255 Office Info@cyberrave.com http://www.cyberrave.com. 1998 Presidential Directive 63.

Download Presentation

Remote Access Virtual Environment (RAVE) A VPN Knowledge Grid

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Remote Access Virtual Environment (RAVE) A VPN Knowledge Grid Joseph A. Sprute, Founder/Principal 33 Westbury Dr. Bella Vista, Arkansas 72714 479-876-6255 Office Info@cyberrave.com http://www.cyberrave.com

  2. 1998 Presidential Directive 63 PDD-63 and its implementation raise a number of issues. Among them is the ability and willingness of the private sector to cooperate with the federal government in sharing information. To what extent will the federal government get involved in the monitoring of privately operated infrastructures and what are the privacy implications? Excerpt: Congressional Research Service Report

  3. Introduction • CyberRAVE is an Online Business Development company in business since 1996, with International customer base. • Directly involved with Critical Infrastructure Protection (CIP) Planning since 1998. • Registrar of Industry and Government Virtual Private Network (VPN) Internet Domain Names.

  4. Mission To provide Communities-of-Interest (COI) ever increasing levels of information security, actionable intelligence, and simplified access to remote resources by establishing Vertical Communities governed by democratic online Advisor Groups (VCAG).

  5. Vision • Establish a structured network environment, accessible from anywhere, that maximizes free interchange of information while continuously addressing & adapting to the needs of Network Members, and the issues and probable conflicts identified in PPD-63 • In other words; a RAVE

  6. RAVE Objectives • Help strengthen relationships among participating RAVE network users • To increase the level of data security for RAVE users • To recognize and support individual privacy and personal freedom to the greatest extent • To reduce burdens associated with regulatory control • To provide timely access to community intelligence, and deliver decision support through real-time situation awareness • To establish a democratic framework for online communities • To fostering data transmission rights and responsibilities development

  7. Current Environment • Information is the new currency • Situation awareness & decision support • Knowledge driven society • Disjointed data management systems • Incentive towards community involvement • Knowledge is power • Content is king • America’s economic security is at stake • Open systems lack trust mechanism • User privacy / data security is at serious risk • Fear is not an adequate means to ‘sell’ information security

  8. Unstructured (Raw) DataObstacle to Information Efficiency • Frequently repeated common tasks • As the structure of data increases, the risk of compromise increases • Individuals, groups & governments are not equipped to combat internal / external data threats & abuses But … • Standardized data resources establish an information commodity that Virtual Community users can exchange • Threat of security breach provides common incentive to establish effective data protection methods

  9. Knowledge Grid: Solutions

  10. Open Security StandardsData Protection • Encrypted data channels • Federated ID Management • Transparent Policy Oversight

  11. Semantic MediationData Transformation Semantic Validation Evaluation of standards conformity, data relevancy & integrity Cognitive (descriptive) label generates a contextual representation of data packet Syntax Interpretation Taxonomy Classification Context label is associated with data classification, sub attributes assigned URN Adaptation Translates & encrypts data ‘value’ into generalized natural language data string URI Annotation Assigns data string to index in RAVE ‘Data Bank’ Stores transaction in ‘Asset Bank’ Indexing

  12. RAVE CommunityOrganic Model Vertical Market Segment (Community) Regulatory Oversight Community Advisory Group Policy Development & Enforcement Rules & Roles Industry & Vertical Community User & Enterprise

  13. Vertical Community Advisory Group (VCAG)Policy Framework: Principals & Constitution • Representative Virtual Democracy • Network Users • Associations • Industries • Academia • Governments • Community defined Roles, Guidelines (best practices), and Laws • Authentication, Authorization, Accounting (AAA) • Metadata schema definition (ontology + taxonomy) • Metadata management, storage, and use

  14. Data TransformationCommoditization Process Unstructured (Raw) Data Flow Structured Metadata Policy Framework VCAG Policy Controlled Data Index Analytic Platforms

  15. Core TechnologiesOpen System Interconnection (OSI) Layer 6 — Presentation • Extensible Markup Language (XML) • Cleanings of ‘Raw’ data • Simple Object Access Protocol (SOAP) • Encode Web service information • Extensible Access Control Markup Language (XACML) • Attaching access privileges to semi-structured data • Universal Description, Discovery and Integration (UDDI) • Distributed online business directory • Web Service Description Language (WSDL) • Describes Web service capabilities • Security Agent Markup Language (SAML) • Single sign-on framework ensures secure communication with authentication, authorization, and non-repudiation • Lightweight Directory Access Protocol (LDAP) • Set of directory protocols

  16. Digital VaultApplied Research Tools Platform Intelligent Agents Activity Monitoring Business Analytics Relationship Management Data Modeling Resource Planning

  17. Change Management • Social • Economic • Political • Legal • Technical • Administrative Heuristically Prescriptive / Proscriptive

  18. Boundaryless Organization Architecture (BOA) • Threats & opportunities detection system • Unified view • Situation awareness • Works with existing technologies / methodologies • Network agnostic • Security (interoperable) • Privacy (roles & rules governed) • Common-of-the-shelf (COTS) technologies • Deployable in-house, or via Service Provider • Works at all levels of the supply / value chain • Vendor neutral delivery and maintenance • Intelligence • Cataloging achieved through Dublin Core Metadata, PICS, or similar agreed schema • Data assets must be cataloged as Metadata before it can be commoditized. • Repeatable use of metadata • Determination of metadata exceptions • Generalized maintenance of taxonomic catalogs • Increased probability of predictable results • Predictability determined through automated data monitor (heuristic) • Aggregated cost structure • Benefits all who participate

  19. Benefits Governed by VCAG • Behavior analysis • Search • Keyword / phrase usage • Pattern recognition • Traffic profiling • Data modeling • Predictive Analytics (PA) • Usage monitoring • Increased efficiencies • Early recognition and notification • Threats • Opportunities

  20. Challenges • Linking Disparate Systems • ID Management, authentication and authorization between application and security service layers • Simplified authorization schema between application layers • Application development methods • Interoperability • Standards development, security, web services, privacy, semantic ontologies • QOS / SLA • Public & private ‘Buy-In’ • Regulatory / policy controls • Roles • Rules • Compliance • Enforcement

  21. On the Horizon Shared Security Services • IDS/IPS • Forensics • Audits • WebLogic Enterprise Security (WLES) — BEA, shared application security • Self healing, patches, viruses, intrusions, denial of service, spam etc. • Dynamic rules • Simplified application security policies • Bundled services • Voice / speech activation & navigation • Federated architecture • Distributed file system(s) • Distributed applications • Unified security policies • Centralized authorization support • Collaboration • Unified / consolidated billing • ID Management

  22. Thank you Joseph A. Sprute, Founder/Principal 33 Westbury Dr. Bella Vista, Arkansas 72714 479-876-6255 Office Info@cyberrave.com http://www.cyberrave.com

  23. Appendix

  24. Customer Driven • Image Goes here. • Illustration shows how end users establish and maintain autonomy, while participating among a free (virtual) market exchange. Include prescriptive and proscriptive

  25. Governance • Image goes here. • Illustrate how policies are created, what they apply to, and how they are managed (e.g. New Constitution for the Virtual World). Include objectives, principals, and adaptive framework.

  26. NamespacePrincipal Categories • Industries • Government Sectors • Military Department • Relevant Technologies • Business Processes • Geographies

  27. Grid Computing • Semantics Security • Meta-processing • P2P application sharing • Shared resources

  28. Data ThroughputCommoditization Process • Valued based upon • Users level of contribution • Degree of data integrity / relevancy • Economic value / impact • Capacity for reuse • Market demand / supply • Image goes here. Show matrix.

  29. Unstructured Data • Data Silos • Data resides in thousands of incompatible formats and cannot be systematically managed, integrated, unified or cleansed. • Multiple data technologies • Legacy formats • Relational • XML • Structural Incompatibility • Data assets have semantic differences • Taxonomy derived from business entities • Product segmentation • User and customer vocabulary • Rules governing various formats are manually created time and again. • The problem is growing • Enterprises continue to acquire subsidiaries, reengineer processes, outsource operations, integrate with supply chain partners and implement regulations. • Developers continue writing new applications and databases.

More Related