Example of a Cybersecurity Analysis Use case using 3D and 4D ontologies.
So, as explored in the previous blog - I’ve attempted a basic overview of where and how 3d and 4d ontologies differ to a particular (fictional Cybersecurity use case)
Some caveats:
1) It is highly simplified so the concepts illustrated are far more complex than represented
2) TLO - Means ‘Top Level Ontology’ a specific feature of 4D Ontologies that conveys their benefit in addressing interoperability (and other areas such as provenance) but also conveys the challenge in the technical effort required to generate them
3) One of the hardest things to convey is the actual benefit of the ‘river of time’ that the temporal aspect brings to analysis - this is something hard to illustrate, but I hope we’re getting there.
I’ve produced this as a google drawing so I’m happy to update and refine with feedback, as noted its a first attempt to really boil this down to the basics so it is very much a work in progress!