Translation of "cyber security solutions" to Chinese language:


  Dictionary English-Chinese

Cyber security solutions - translation : Security - translation :

  Examples (External sources, not reviewed)

Cyber security was also being advanced.
网络安全问题也被提了出来
Encourage countries with relevant capabilities to provide assistance in cyber security and IT protection.
鼓励具备相关能力的各国在网络安全和信息技术保护方面提供援助
Cyber Insecurity
网络的不安全
Cyber Café
网吧
Cyber crime
网络犯罪
Cyber war and cyber espionage are largely associated with states, while cyber crime and cyber terrorism are mostly associated with non state actors. The highest costs currently stem from espionage and crime but, over the next decade or so, cyber war and cyber terrorism may become greater threats than they are today.
网络战和网络间谍大多与国家有关 与此同时 网络犯罪和网络恐怖主义往往由非国家行动者发出 目前 最大的成本来自间谍和犯罪 但是 在未来十年中 网络战和网络恐怖主义有可能成为比今天更大的威胁 此外 同盟和战术的演化 分类也可能日渐重叠 恐怖主义可以从犯罪分子那里买来恶意软件 政府可能会在背后指使
China s Cyber Warriors
中国的网络战士
Given the enormous uncertainties involved, the new cyber dimensions of security must be high on every government s agenda.
基于涉及到巨大的不确定性 解决网络安全出现的新问题必须列在每个政府重要的议程上
Cyber War and Peace
网络战争与和平
Can Cyber Warfare Be Deterred?
网络战能否被遏制
Consider the threat of cyber terrorism.
对网络恐怖主义的威胁进行思考
Given that security is a traditional function of the state, some observers believe that growing insecurity will lead to a greater role for governments in cyberspace. Indeed, accounts of cyber war may be exaggerated, but cyber espionage is rampant, and more than 30 governments are reputed to have developed offensive capabilities and doctrines for the use of cyber weapons.
鉴于安全是政府的一项传统职能 一些观察家认为越来越多的不安全因素会导致各国政府在网络空间中更为活跃 事实上 宣扬网络战争可能有些夸大其辞 但网络间谍活动的确非常猖獗 30多个国家政府被认为具备了网络武器应用的学说和攻击力 自从2009 2010年震网病毒被用于破坏伊朗核计划后 各国政府开始认真对待网络武器所造成威胁
I summon the Mawefic Cyber End Dwagon!
我召喚Sin 智能終極龍!
For example, a taxation and regulatory exchange would help countries to tackle tax avoidance and harmonize corporate taxation, while promoting information sharing and cooperation. Likewise, a cyber security data sharing platform could prove vital to understanding, preventing, and responding to cyber attacks.
此外 牛津马丁委员会还建议成立自愿平台促成矛盾领域的全球性条约 比如 税收和监管交流有助于各国应对偷漏税 协调公司税 同时促进信息共享和合作 类似地 网络安全数据共享平台能在认识 防止 和应对网络攻击方面起到关键作用
Encourage adoption of the Council of Europe's Convention of Cyber Crime, May 2001, as the basis for standardized cyber crime efforts.
鼓励采纳欧洲委员会2001年5月的 打击网络犯罪公约 作为标准化的打击网络犯罪工作的基础
In 2004, the ECSG continued its work on data privacy, consumer protection, cyber security, paperless trading, trade facilitation and initiatives to counter spam.
23. 2004年 电子商务指导小组继续其关于数据隐私权 消费者保护 网络安全 无纸贸易 贸易便利和制止垃圾邮件举措的工作
The US accuses China of using cyber espionage to steal intellectual property on an unprecedented scale. Among other public sources, it could point to a study by the cyber security firm Mandiant, which traced many such attacks to a People s Liberation Army facility in Shanghai.
美国指责中国以前所未见的规模使用网络间谍盗取知识产权 美国援引的公开资源之一是网络安全公司Mandiant的一份研究 该研究跟踪到 此类袭击来自中国人民解放军在位于上海的设施 中国反驳说 它也是无处不在的网络入侵的受害者 其中许多来自美国
Nonetheless, it may be possible to identify behaviors like cyber crime that are illegal in many domestic jurisdictions. Trying to limit all intrusions would be impossible, but one could start with cyber crime and cyber terrorism involving non state parties.
尽管如此 在本国司法辖区内鉴别网络犯罪等非法行为仍是可能的 阻止一切侵入或许不可行 但可以从网络犯罪和非国家行动方参与的网络恐怖主义着手 在这方面 通过同意在取证和控制方面达成一致来限制伤害符合大国的利益
The US and China (as well as other countries) have much to gain from collaborating on transnational issues. One cannot devise and implement solutions to global financial stability, climate change, cyber terrorism, or pandemics without such cooperation.
但仅仅将目光放在美国战略的 包围 方面是不全面的 美国和中国 以及其他国家 可以通过在国际事务上的合作获益良多 没有这些合作 一个国家是无法独力策划和应对包括全球金融稳定 气候变化 打击网络犯罪或者抗击传染病等事务的
Every village in Africa now has a cyber cafe.
现在非洲的每一个村庄都有公共网吧
Will Governmental Folly Now Allow for a Cyber Crisis?
政府的愚蠢能否立即导致一场网络危机
Cyber activists want to meet with the Supreme Leader.
网络积极分子想跟最高领袖见面
We called the project CyArk, which stands for Cyber Archive.
我们称之为 数字方舟 计划 代表着数字档案
While the countries of the North Atlantic Treaty Organization (NATO) or similar countries such systems are generally still very secure, information warfare has attracted substantial funding in these nations and has given rise to a burgeoning vocabulary of cyber terms cyber operations, cyber attacks, cybermunitions, etc.
虽然北约组织国家和类似国家内的这种系统普遍地仍然非常安全,但信息战争在这些国家中已经吸引到大量的经费,并且因而冒出了一些电脑名词,如电脑行动 电脑攻击 电脑军火等
1. Have emergency warning networks regarding cyber vulnerabilities, threats and incidents.
1. 建立有关网络脆弱性 威胁和事故的紧急警报网
In America, you have the Cyber Intelligence Sharing and Protection Act.
在美国 有网络情报分享和保护法案
Let's shift to a different kind of sea, the cyber sea.
现在让我们转到另一种海洋 网络的海洋
Looks like your Cyber End Dragon is about to be toast.
你的終結龍 就要被烤熟嚕
While an international legal code that defines cyber attacks more clearly, together with cooperation on preventive measures, can help, such arms control solutions are not likely to be sufficient. Nor will defensive measures like constructing electronic firewalls and creating redundancies in sensitive systems.
虽然能更加明确地定义网络攻击的国际法律系统再加上在预防措施方面的合作 能起到作用 但无论像这样的裁军式的解决方案 还是像建设电子防火墙和在敏感统中建立冗余这样的防御性措施 都不足以解决问题
Finding solutions to transcend differences related to the reform of the Security Council is of the utmost importance.
为跨越与安全理事会改革相关的分歧而找到解决办法至关重要
Rarely hear about cyber hedonism, for example, how people are becoming passive.
但却很少听说比如 网络享乐主义 之类的说法 听说人们是如何因为互联网而变得被动消极的
The objective we seek in disarmament is to tackle threats to global security and find solutions to existing challenges.
处理全球安全面临的威胁和设法化解现存挑战是我们谋求的裁军目标
But the most politically sensitive topic for China has little to do with cyber security or the South China Sea. It is China s ongoing crackdown on civil liberties and human rights.
但对中国来说 政治上最敏感的话题既非网络安全 亦非南海 而是中国一直在镇压公民自由和人权的问题
Cyber weapons have this peculiar feature they can be used without leaving traces.
网络武器有个特征 使用网络武器 可以不留痕迹
And this coordination may become even trickier with the introduction of cyber weapons.
调剂会变得更加复杂 当我们有了网路武器
Further cooperation and collaboration would cover the areas of broadband deployment, cyber security capacity building, ICT use for the disabled and elderly, Radio Frequency Identification (RFID) and virtual network of software multilingualization.
进一步的合作和协作领域将有宽带配置 网络安全能力建设 残疾人和老年人使用信息和通信技术 无线电频率的识别和软件多语言化虚拟网络
A well trained, educated staff could provide more effective multilateral solutions in the areas of development, peace and collective security.
一个受过良好培训和教育的职员可以在发展 和平与集体安全领域提供更有效的多边解决办法
Without concrete and rapid security solutions, everyday users and potential users may lose confidence in business transactions over the Internet.
没有具体和便捷的安全解决办法 日常用户和潜在用户可能失去对通过互联网进行商业交易的信心
The US is most concerned about cyber security and the protection of intellectual property and infrastructure. Authoritarian governments are more concerned about information security the ability to control what is available on the Internet in order to maintain political and social stability.
与此同时 网络空间领域的合作才刚刚开始 艰难起步 美国最关心网络安全和保护知识产权和基础设施 专制政府更关心信息安全 控制在互联网上获得什么信息的能力 以维护政治和社会稳定 对于该领域合理的目标 尚没有一致意见 无处不在的非政府行动方让事情更加复杂了
China deploys tens of thousands of cyber police to block Web sites, patrol cyber cafes, monitor the use of cellular telephones, and track down Internet activists. But the threat to the new global commons comes not from what China does domestically. Rather, it comes from the way in which the know how that China has gained in fashioning domestic cyber oversight is proving invaluable to it in its efforts to engage in cyber intrusion across its frontiers.
中国部署了数万名 网警 以封锁网站 在网吧中进行巡查 监控移动电话的使用 并追踪互联网上的活跃人士 但全球新的公域所受之威胁 并非来自于中国在其国内的做法 而是来自于另一个方面 即中国在构建国内网络监控这一过程中所学到的技术 已被证明对其从事跨境网络入侵的努力具有无从估量的价值这一点
Durable solutions
B. 持久的解决办法
Possible Solutions
可能的解决方法
Possible Solutions
可能解决方案
Durable solutions
持久解决
Until recently, cyber security was largely the domain of a small community of computer experts. When the Internet was created in the 1970s, its members formed a virtual village everyone knew one another, and together they designed an open system, paying little attention to security.
就在不久前 网络安全还是一小撮电脑专家的专属领域 20世纪70年代互联网创建时 网络成员就组成了一个虚拟社区 社区里的每个人都互相认识 他们共同设计了一个开放式系统 几乎很少考虑安全问题

 

Related searches : Cyber Security - Cyber Security Attacks - Cyber Security Policy - Cyber Security Threats - Cyber Security Risks - Cyber Security Strategy - Cyber Security Industry - Security Solutions - Endpoint Security Solutions - Cyber World - Cyber Defence - Cyber Warfare - Cyber-terrorism - Cyber Intelligence