Translation of "cyber security attacks" to Chinese language:
Dictionary English-Chinese
Examples (External sources, not reviewed)
Cyber security was also being advanced. | 网络安全问题也被提了出来 |
For example, a taxation and regulatory exchange would help countries to tackle tax avoidance and harmonize corporate taxation, while promoting information sharing and cooperation. Likewise, a cyber security data sharing platform could prove vital to understanding, preventing, and responding to cyber attacks. | 此外 牛津马丁委员会还建议成立自愿平台促成矛盾领域的全球性条约 比如 税收和监管交流有助于各国应对偷漏税 协调公司税 同时促进信息共享和合作 类似地 网络安全数据共享平台能在认识 防止 和应对网络攻击方面起到关键作用 |
The US accuses China of using cyber espionage to steal intellectual property on an unprecedented scale. Among other public sources, it could point to a study by the cyber security firm Mandiant, which traced many such attacks to a People s Liberation Army facility in Shanghai. | 美国指责中国以前所未见的规模使用网络间谍盗取知识产权 美国援引的公开资源之一是网络安全公司Mandiant的一份研究 该研究跟踪到 此类袭击来自中国人民解放军在位于上海的设施 中国反驳说 它也是无处不在的网络入侵的受害者 其中许多来自美国 |
In fact, the two sides are reportedly negotiating a landmark deal that would prohibit cyber attacks against each other s vital infrastructure. An agreement on the issue could be the most important outcome of the summit, although other types of cyber attacks are unlikely to be covered by it. | 中国则释放了一位人权活动家 并派了一个高规格代表团来到美国讨论网络安全问题 事实上 双方据称正在谈判一项里程碑式的协议 禁止互相网络攻击关键基础设施 在这一问题上形成协议可能是峰会最重要的成果 尽管该协议不可能覆盖其他类型的网络袭击 |
While the countries of the North Atlantic Treaty Organization (NATO) or similar countries such systems are generally still very secure, information warfare has attracted substantial funding in these nations and has given rise to a burgeoning vocabulary of cyber terms cyber operations, cyber attacks, cybermunitions, etc. | 虽然北约组织国家和类似国家内的这种系统普遍地仍然非常安全,但信息战争在这些国家中已经吸引到大量的经费,并且因而冒出了一些电脑名词,如电脑行动 电脑攻击 电脑军火等 |
And so there's a lot of I'm sure you've read a lot in papers, about worries about cyber attacks and defenses against those. | 所以人们不免有许多 我相信你们在报纸上也看了很多 有关网络攻击 和对网络攻击的防御的担忧. |
Encourage countries with relevant capabilities to provide assistance in cyber security and IT protection. | 鼓励具备相关能力的各国在网络安全和信息技术保护方面提供援助 |
Cyber threats and potential cyber warfare illustrate the increased vulnerabilities and loss of control in modern societies. Governments have mainly been concerned about hacker attacks on their own bureaucracy s information technology infrastructure, but there are social vulnerabilities well beyond government computers. | 网络空间存在的威胁和潜在的网络战争说明了现代社会中不断增加的危险性和失控 政府主要担心的是其官僚机构的信息技术基础设施被黑客们攻击 但是 还有远远超出政府电脑设备范围的社会危险性的存在 |
Cyber Insecurity | 网络的不安全 |
Cyber Café | 网吧 |
Cyber crime | 网络犯罪 |
Cyber war and cyber espionage are largely associated with states, while cyber crime and cyber terrorism are mostly associated with non state actors. The highest costs currently stem from espionage and crime but, over the next decade or so, cyber war and cyber terrorism may become greater threats than they are today. | 网络战和网络间谍大多与国家有关 与此同时 网络犯罪和网络恐怖主义往往由非国家行动者发出 目前 最大的成本来自间谍和犯罪 但是 在未来十年中 网络战和网络恐怖主义有可能成为比今天更大的威胁 此外 同盟和战术的演化 分类也可能日渐重叠 恐怖主义可以从犯罪分子那里买来恶意软件 政府可能会在背后指使 |
China s Cyber Warriors | 中国的网络战士 |
Given the enormous uncertainties involved, the new cyber dimensions of security must be high on every government s agenda. | 基于涉及到巨大的不确定性 解决网络安全出现的新问题必须列在每个政府重要的议程上 |
Cyber War and Peace | 网络战争与和平 |
Computer hackers attacked Georgian government Web sites in the weeks preceding the outbreak of armed conflict. The Russia Georgia conflict represents the first significant cyber attacks accompanying armed conflict. | 武装冲突爆发前的数周 电脑黑客们就攻击了格鲁吉亚的一些政府网站 俄罗斯与格鲁吉亚之间的冲突是首次伴随着武装冲突的重大网络袭击 欢迎各位来到二十一世纪 |
For example, countries at the lower end of the digital divide were used as staging grounds to launch cyber attacks or as transit countries to mask the cybercrime trail. | 例如 处于数字鸿沟底端的国家往往被用作发起电脑攻击的集结地 或作为过境国而掩盖电脑犯罪的踪迹 |
E. Deaths due to attacks or killings by security forces, | E. 因保安部队 准军事集团 与政府串通或政府 |
Can Cyber Warfare Be Deterred? | 网络战能否被遏制 |
Consider the threat of cyber terrorism. | 对网络恐怖主义的威胁进行思考 |
Given that security is a traditional function of the state, some observers believe that growing insecurity will lead to a greater role for governments in cyberspace. Indeed, accounts of cyber war may be exaggerated, but cyber espionage is rampant, and more than 30 governments are reputed to have developed offensive capabilities and doctrines for the use of cyber weapons. | 鉴于安全是政府的一项传统职能 一些观察家认为越来越多的不安全因素会导致各国政府在网络空间中更为活跃 事实上 宣扬网络战争可能有些夸大其辞 但网络间谍活动的确非常猖獗 30多个国家政府被认为具备了网络武器应用的学说和攻击力 自从2009 2010年震网病毒被用于破坏伊朗核计划后 各国政府开始认真对待网络武器所造成威胁 |
I summon the Mawefic Cyber End Dwagon! | 我召喚Sin 智能終極龍! |
Encourage adoption of the Council of Europe's Convention of Cyber Crime, May 2001, as the basis for standardized cyber crime efforts. | 鼓励采纳欧洲委员会2001年5月的 打击网络犯罪公约 作为标准化的打击网络犯罪工作的基础 |
More and more, nations are waging attacks with cyber weapons silent strikes on another country's computer systems that leave behind no trace. At TEDxParis, Guy Philippe Goldstein shows how cyberattacks can leap between the digital and physical worlds to prompt armed conflict and how we might avert this global security hazard. | 世界各国日渐受到网络攻击 这种对另一个国家的电脑系统的无声的打击 通常无迹可寻 还记得蠕虫吗 在TED巴黎会上 盖尔 菲力浦 戈斯坦展示了数码世界中的网络攻击是如何导致现实世界中的武力冲突 以及我们如何才能防止这一全球性的安全隐患 |
In 2004, the ECSG continued its work on data privacy, consumer protection, cyber security, paperless trading, trade facilitation and initiatives to counter spam. | 23. 2004年 电子商务指导小组继续其关于数据隐私权 消费者保护 网络安全 无纸贸易 贸易便利和制止垃圾邮件举措的工作 |
The main risk of violence created by the nature of the electricity system itself is the danger of serious power outages due to physical or cyber attacks on the increasingly fragile transmission and distribution grid. | 由电力系统本身的特点所引发的主要暴力危险是由对日益脆弱的电力输配网络发起的真实或虚拟攻击所导致的严重停电事故 |
Indeed, some security attacks are merely exploits of this kind of overly built security, which tends to erode over time. | һ 㲟 |
The Security Council also condemns all terrorist attacks in Iraq, including the attempted assassinations of diplomats from Bahrain and Pakistan and attacks against other civilian personnel. | 安全理事会还谴责在伊拉克的一切恐怖袭击 包括图谋暗杀巴林和巴基斯坦外交官及攻击其他文职人员的行为 |
Nonetheless, it may be possible to identify behaviors like cyber crime that are illegal in many domestic jurisdictions. Trying to limit all intrusions would be impossible, but one could start with cyber crime and cyber terrorism involving non state parties. | 尽管如此 在本国司法辖区内鉴别网络犯罪等非法行为仍是可能的 阻止一切侵入或许不可行 但可以从网络犯罪和非国家行动方参与的网络恐怖主义着手 在这方面 通过同意在取证和控制方面达成一致来限制伤害符合大国的利益 |
The US extradited a low level Chinese official to face corruption charges. The Obama administration also decided not to announce sanctions against Chinese entities and individuals allegedly involved in cyber attacks on American companies and government agencies. | 在峰会即将到来之际 美国和中国领导人都采取了积极 尽管是象征性 的举措证明各自的良好意愿 改善外交氛围 美国遣返了一名面临腐败指控的低级中国官员 奥巴马政府还决定不对被控参与对美国公司和政府机构发动网络袭击的中国单位和个人进行制裁 |
Every village in Africa now has a cyber cafe. | 现在非洲的每一个村庄都有公共网吧 |
Will Governmental Folly Now Allow for a Cyber Crisis? | 政府的愚蠢能否立即导致一场网络危机 |
Cyber activists want to meet with the Supreme Leader. | 网络积极分子想跟最高领袖见面 |
At a time when cyber attacks are increasing worldwide, US Secretary of State Hillary Clinton was right to declare that an attack on one nation s computer networks can be an attack on all. Indeed, the attacks are a reminder that, as a new part of the global commons, cyberspace already has come under threat. | 在这个全球范围内 网络攻击日渐高发的时代 美国国务卿希拉里 克林顿采取了正确的做法 她宣布对一国计算机网络所实施的攻击 将是对全体的攻击 事实上 这些攻击便是在提醒人们 网络空间这一全球公域中新的成员 已经处在了威胁之下 |
There are too many risks human error, technical flaws, negligence, cyber attacks, and more to believe that these weapons will never be used. Nor is there good reason to believe that adequate fail safe mechanisms are in place. | 人为错误 技术缺陷 粗心大意 网络攻击等等等等 核武器有太多的风险无法排除 相信这些武器永远不会被使用是一种错误 而且也没有理由认为建立了充分的故障安全机制 1945年后的核武器史 无论在古巴导弹危机之前还是之后 随处可见侥幸逃脱的例子 |
We called the project CyArk, which stands for Cyber Archive. | 我们称之为 数字方舟 计划 代表着数字档案 |
But getting to 2030 without a major confrontation will be a major achievement. While the US is likely to maintain the upper hand in terms of military power for at least another 15 20 years, asymmetric warfare could undercut America s advantage should China engage in cyber attacks on US electronic and satellite systems, along with attacks on infrastructure. | 就共同的外部威胁 尤其是核扩散 全球气候变化和伊斯兰极端主义进行合作或许是避免对抗的最好方法 但在不出现大规模对抗的前提下安然进入2030将是一种莫大的成就 尽管美国可能在今后至少15 20年内仍将在军事实力上占据上风 但如果中国在对美电子及卫星系统发动网络攻击的同时对美基础设施发起攻击 美国的优势可能会在非对称战争中遭到削弱 |
Protecting systems from attacks primarily relies on the implementation of appropriate technical, physical and operational security measures. | 57. 保护系统免遭攻击主要依赖于采用恰当的技术 实际和操作上的安全措施 |
Gun attacks also took place during this period, against the security forces and members of the public. | 在同一期间还发生了对治安部队和普通民众的枪击事件 |
1. Have emergency warning networks regarding cyber vulnerabilities, threats and incidents. | 1. 建立有关网络脆弱性 威胁和事故的紧急警报网 |
In America, you have the Cyber Intelligence Sharing and Protection Act. | 在美国 有网络情报分享和保护法案 |
Let's shift to a different kind of sea, the cyber sea. | 现在让我们转到另一种海洋 网络的海洋 |
Looks like your Cyber End Dragon is about to be toast. | 你的終結龍 就要被烤熟嚕 |
As I have already indicated, the current security situation in Darfur remains volatile, with ongoing violence and attacks. | 像我已经表示的那样 达尔富尔目前的安全局势继续动荡不定 存在着持续的暴力和袭击 |
Perhaps the most worrying developments with respect to United Nations security have been the unprecedented attacks on diplomats. | 联合国安保工作最令人担忧的事态发展或许是对外交人员进行的前所未有的攻击 |
Related searches : Sophisticated Cyber Attacks - Cyber Security - Security Attacks - Cyber Security Policy - Cyber Security Threats - Cyber Security Risks - Cyber Security Strategy - Cyber Security Solutions - Cyber Security Industry - Cyber World - Cyber Defence - Cyber Warfare - Cyber-terrorism