Translation of "cyber secure" to Chinese language:


  Dictionary English-Chinese

Cyber secure - translation : Secure - translation :

  Examples (External sources, not reviewed)

While the countries of the North Atlantic Treaty Organization (NATO) or similar countries such systems are generally still very secure, information warfare has attracted substantial funding in these nations and has given rise to a burgeoning vocabulary of cyber terms cyber operations, cyber attacks, cybermunitions, etc.
虽然北约组织国家和类似国家内的这种系统普遍地仍然非常安全,但信息战争在这些国家中已经吸引到大量的经费,并且因而冒出了一些电脑名词,如电脑行动 电脑攻击 电脑军火等
Cyber Insecurity
网络的不安全
Cyber Café
网吧
Cyber crime
网络犯罪
Cyber war and cyber espionage are largely associated with states, while cyber crime and cyber terrorism are mostly associated with non state actors. The highest costs currently stem from espionage and crime but, over the next decade or so, cyber war and cyber terrorism may become greater threats than they are today.
网络战和网络间谍大多与国家有关 与此同时 网络犯罪和网络恐怖主义往往由非国家行动者发出 目前 最大的成本来自间谍和犯罪 但是 在未来十年中 网络战和网络恐怖主义有可能成为比今天更大的威胁 此外 同盟和战术的演化 分类也可能日渐重叠 恐怖主义可以从犯罪分子那里买来恶意软件 政府可能会在背后指使
China s Cyber Warriors
中国的网络战士
Cyber War and Peace
网络战争与和平
Can Cyber Warfare Be Deterred?
网络战能否被遏制
Cyber security was also being advanced.
网络安全问题也被提了出来
Consider the threat of cyber terrorism.
对网络恐怖主义的威胁进行思考
I summon the Mawefic Cyber End Dwagon!
我召喚Sin 智能終極龍!
Encourage adoption of the Council of Europe's Convention of Cyber Crime, May 2001, as the basis for standardized cyber crime efforts.
鼓励采纳欧洲委员会2001年5月的 打击网络犯罪公约 作为标准化的打击网络犯罪工作的基础
Nonetheless, it may be possible to identify behaviors like cyber crime that are illegal in many domestic jurisdictions. Trying to limit all intrusions would be impossible, but one could start with cyber crime and cyber terrorism involving non state parties.
尽管如此 在本国司法辖区内鉴别网络犯罪等非法行为仍是可能的 阻止一切侵入或许不可行 但可以从网络犯罪和非国家行动方参与的网络恐怖主义着手 在这方面 通过同意在取证和控制方面达成一致来限制伤害符合大国的利益
Every village in Africa now has a cyber cafe.
现在非洲的每一个村庄都有公共网吧
Will Governmental Folly Now Allow for a Cyber Crisis?
政府的愚蠢能否立即导致一场网络危机
Cyber activists want to meet with the Supreme Leader.
网络积极分子想跟最高领袖见面
We called the project CyArk, which stands for Cyber Archive.
我们称之为 数字方舟 计划 代表着数字档案
1. Have emergency warning networks regarding cyber vulnerabilities, threats and incidents.
1. 建立有关网络脆弱性 威胁和事故的紧急警报网
In America, you have the Cyber Intelligence Sharing and Protection Act.
在美国 有网络情报分享和保护法案
Let's shift to a different kind of sea, the cyber sea.
现在让我们转到另一种海洋 网络的海洋
Looks like your Cyber End Dragon is about to be toast.
你的終結龍 就要被烤熟嚕
Rarely hear about cyber hedonism, for example, how people are becoming passive.
但却很少听说比如 网络享乐主义 之类的说法 听说人们是如何因为互联网而变得被动消极的
Cyber weapons have this peculiar feature they can be used without leaving traces.
网络武器有个特征 使用网络武器 可以不留痕迹
And this coordination may become even trickier with the introduction of cyber weapons.
调剂会变得更加复杂 当我们有了网路武器
Secure
安全
Secure
安全
China deploys tens of thousands of cyber police to block Web sites, patrol cyber cafes, monitor the use of cellular telephones, and track down Internet activists. But the threat to the new global commons comes not from what China does domestically. Rather, it comes from the way in which the know how that China has gained in fashioning domestic cyber oversight is proving invaluable to it in its efforts to engage in cyber intrusion across its frontiers.
中国部署了数万名 网警 以封锁网站 在网吧中进行巡查 监控移动电话的使用 并追踪互联网上的活跃人士 但全球新的公域所受之威胁 并非来自于中国在其国内的做法 而是来自于另一个方面 即中国在构建国内网络监控这一过程中所学到的技术 已被证明对其从事跨境网络入侵的努力具有无从估量的价值这一点
Encourage countries with relevant capabilities to provide assistance in cyber security and IT protection.
鼓励具备相关能力的各国在网络安全和信息技术保护方面提供援助
Given that security is a traditional function of the state, some observers believe that growing insecurity will lead to a greater role for governments in cyberspace. Indeed, accounts of cyber war may be exaggerated, but cyber espionage is rampant, and more than 30 governments are reputed to have developed offensive capabilities and doctrines for the use of cyber weapons.
鉴于安全是政府的一项传统职能 一些观察家认为越来越多的不安全因素会导致各国政府在网络空间中更为活跃 事实上 宣扬网络战争可能有些夸大其辞 但网络间谍活动的确非常猖獗 30多个国家政府被认为具备了网络武器应用的学说和攻击力 自从2009 2010年震网病毒被用于破坏伊朗核计划后 各国政府开始认真对待网络武器所造成威胁
Secure Shell
Secure Shell
Secure device
安全设备
Secure FTP
安全 FTP
Most Secure
高对比Comment
All secure.
没问题了
However, this episode reveals the growing anxiety in the Western world regarding these emerging cyber weapons.
总之 这个事件说明了 对于这些层出不穷的网络武器 西方社会的担忧有增无减
We often hear about cyber activism, how people are getting more active because of the Internet.
我们常常听说网络积极主义 听说人们是如何因为互联网而变得更加积极的
(i) Conference services (ROE) maintenance and servicing of a publicly accessible environmental library and cyber café.
㈠ 会议服务 欧洲区域办事处 公共环境图书馆和网吧的维护与服务
Cyber Tale of Three Cities , a 30 minute video documentary with Habitat themes, completed in English
2. ꆰ뗧쓔쫀뷧죽돇볇ꆱ,틔짺뺳캪훷쳢뗄슼쿱볇슼욬,뎤30럖훓,틑틔펢컄췪돉훆ퟷ
Nonetheless, at the end of the conference, there was still no consensus on global cyber governance. Many governments continued to advocate traditional United Nations voting procedures for making global decisions, and defend their right to control domestic cyber activities.
然而会议结束时 仍然没有就全球网络治理问题达成共识 许多政府主张继续沿用联合国表决的传统程序进行全局决策 捍卫政府控制国内网络活动的权利
In that context, the Subcommittee requested ESCAP to finance and organize seminars and training workshops on cyber law to facilitate the sharing of experiences in the development of cyber laws and to promote the importance of harmonizing the laws.
就此 小组委员会要求亚太经社会尤其是在电子商务领域举办关于网络法律的研讨会和培训讲习班 以便就发展网络法律交流经验并宣传协调网络法律的重要性
Secure Sockets Layer
安全套接字层
Secure servers only
只对安全服务器
Portable radio, secure
保密便携式无线电台
Portable radio, secure
保密便携式无线电
Secure the guns!
保護好槍

 

Related searches : Cyber World - Cyber Defence - Cyber Warfare - Cyber-terrorism - Cyber Intelligence - Cyber Liability - Cyber Cafe - Cyber Terrorism - Cyber Law - Cyber- Shot - Cyber Protection - Cyber Policy - Cyber Espionage