Translation of "cyber terrorism" to Chinese language:
Examples (External sources, not reviewed)
Consider the threat of cyber terrorism. | 对网络恐怖主义的威胁进行思考 |
Cyber war and cyber espionage are largely associated with states, while cyber crime and cyber terrorism are mostly associated with non state actors. The highest costs currently stem from espionage and crime but, over the next decade or so, cyber war and cyber terrorism may become greater threats than they are today. | 网络战和网络间谍大多与国家有关 与此同时 网络犯罪和网络恐怖主义往往由非国家行动者发出 目前 最大的成本来自间谍和犯罪 但是 在未来十年中 网络战和网络恐怖主义有可能成为比今天更大的威胁 此外 同盟和战术的演化 分类也可能日渐重叠 恐怖主义可以从犯罪分子那里买来恶意软件 政府可能会在背后指使 |
Nonetheless, it may be possible to identify behaviors like cyber crime that are illegal in many domestic jurisdictions. Trying to limit all intrusions would be impossible, but one could start with cyber crime and cyber terrorism involving non state parties. | 尽管如此 在本国司法辖区内鉴别网络犯罪等非法行为仍是可能的 阻止一切侵入或许不可行 但可以从网络犯罪和非国家行动方参与的网络恐怖主义着手 在这方面 通过同意在取证和控制方面达成一致来限制伤害符合大国的利益 |
Cyber Insecurity | 网络的不安全 |
Cyber Café | 网吧 |
Cyber crime | 网络犯罪 |
China s Cyber Warriors | 中国的网络战士 |
Cyber War and Peace | 网络战争与和平 |
Can Cyber Warfare Be Deterred? | 网络战能否被遏制 |
Cyber security was also being advanced. | 网络安全问题也被提了出来 |
The scope of this task covers 8 designated areas terrorism, trafficking of illicit drugs, human trafficking, money laundering, arms smuggling, sea piracy, international economic crimes and cyber crimes. | 这项任务的范围包括8个认定领域 恐怖主义 非法毒品贩运 人员贩运 洗钱 走私军火 海盗行为 国际经济犯罪和网络犯罪 |
The Second Phase Create an actual center that has a joint database, give advice on technologies, considering the threat of cyber terrorism, update strategic threat to the Gulf. | 第二阶段 建立一个设有联合数据库的实质的中心 就技术问题提供咨询意见 考虑网络恐怖主义的威胁 提出海湾面临的战略威胁的最新资料 |
I summon the Mawefic Cyber End Dwagon! | 我召喚Sin 智能終極龍! |
Encourage adoption of the Council of Europe's Convention of Cyber Crime, May 2001, as the basis for standardized cyber crime efforts. | 鼓励采纳欧洲委员会2001年5月的 打击网络犯罪公约 作为标准化的打击网络犯罪工作的基础 |
Every village in Africa now has a cyber cafe. | 现在非洲的每一个村庄都有公共网吧 |
Will Governmental Folly Now Allow for a Cyber Crisis? | 政府的愚蠢能否立即导致一场网络危机 |
Cyber activists want to meet with the Supreme Leader. | 网络积极分子想跟最高领袖见面 |
We called the project CyArk, which stands for Cyber Archive. | 我们称之为 数字方舟 计划 代表着数字档案 |
While the countries of the North Atlantic Treaty Organization (NATO) or similar countries such systems are generally still very secure, information warfare has attracted substantial funding in these nations and has given rise to a burgeoning vocabulary of cyber terms cyber operations, cyber attacks, cybermunitions, etc. | 虽然北约组织国家和类似国家内的这种系统普遍地仍然非常安全,但信息战争在这些国家中已经吸引到大量的经费,并且因而冒出了一些电脑名词,如电脑行动 电脑攻击 电脑军火等 |
1. Have emergency warning networks regarding cyber vulnerabilities, threats and incidents. | 1. 建立有关网络脆弱性 威胁和事故的紧急警报网 |
In America, you have the Cyber Intelligence Sharing and Protection Act. | 在美国 有网络情报分享和保护法案 |
Let's shift to a different kind of sea, the cyber sea. | 现在让我们转到另一种海洋 网络的海洋 |
Looks like your Cyber End Dragon is about to be toast. | 你的終結龍 就要被烤熟嚕 |
Rarely hear about cyber hedonism, for example, how people are becoming passive. | 但却很少听说比如 网络享乐主义 之类的说法 听说人们是如何因为互联网而变得被动消极的 |
The US and China (as well as other countries) have much to gain from collaborating on transnational issues. One cannot devise and implement solutions to global financial stability, climate change, cyber terrorism, or pandemics without such cooperation. | 但仅仅将目光放在美国战略的 包围 方面是不全面的 美国和中国 以及其他国家 可以通过在国际事务上的合作获益良多 没有这些合作 一个国家是无法独力策划和应对包括全球金融稳定 气候变化 打击网络犯罪或者抗击传染病等事务的 |
Cyber weapons have this peculiar feature they can be used without leaving traces. | 网络武器有个特征 使用网络武器 可以不留痕迹 |
And this coordination may become even trickier with the introduction of cyber weapons. | 调剂会变得更加复杂 当我们有了网路武器 |
China deploys tens of thousands of cyber police to block Web sites, patrol cyber cafes, monitor the use of cellular telephones, and track down Internet activists. But the threat to the new global commons comes not from what China does domestically. Rather, it comes from the way in which the know how that China has gained in fashioning domestic cyber oversight is proving invaluable to it in its efforts to engage in cyber intrusion across its frontiers. | 中国部署了数万名 网警 以封锁网站 在网吧中进行巡查 监控移动电话的使用 并追踪互联网上的活跃人士 但全球新的公域所受之威胁 并非来自于中国在其国内的做法 而是来自于另一个方面 即中国在构建国内网络监控这一过程中所学到的技术 已被证明对其从事跨境网络入侵的努力具有无从估量的价值这一点 |
Encourage countries with relevant capabilities to provide assistance in cyber security and IT protection. | 鼓励具备相关能力的各国在网络安全和信息技术保护方面提供援助 |
Given that security is a traditional function of the state, some observers believe that growing insecurity will lead to a greater role for governments in cyberspace. Indeed, accounts of cyber war may be exaggerated, but cyber espionage is rampant, and more than 30 governments are reputed to have developed offensive capabilities and doctrines for the use of cyber weapons. | 鉴于安全是政府的一项传统职能 一些观察家认为越来越多的不安全因素会导致各国政府在网络空间中更为活跃 事实上 宣扬网络战争可能有些夸大其辞 但网络间谍活动的确非常猖獗 30多个国家政府被认为具备了网络武器应用的学说和攻击力 自从2009 2010年震网病毒被用于破坏伊朗核计划后 各国政府开始认真对待网络武器所造成威胁 |
However, this episode reveals the growing anxiety in the Western world regarding these emerging cyber weapons. | 总之 这个事件说明了 对于这些层出不穷的网络武器 西方社会的担忧有增无减 |
We often hear about cyber activism, how people are getting more active because of the Internet. | 我们常常听说网络积极主义 听说人们是如何因为互联网而变得更加积极的 |
(i) Conference services (ROE) maintenance and servicing of a publicly accessible environmental library and cyber café. | ㈠ 会议服务 欧洲区域办事处 公共环境图书馆和网吧的维护与服务 |
Cyber Tale of Three Cities , a 30 minute video documentary with Habitat themes, completed in English | 2. ꆰ뗧쓔쫀뷧죽돇볇ꆱ,틔짺뺳캪훷쳢뗄슼쿱볇슼욬,뎤30럖훓,틑틔펢컄췪돉훆ퟷ |
Nonetheless, at the end of the conference, there was still no consensus on global cyber governance. Many governments continued to advocate traditional United Nations voting procedures for making global decisions, and defend their right to control domestic cyber activities. | 然而会议结束时 仍然没有就全球网络治理问题达成共识 许多政府主张继续沿用联合国表决的传统程序进行全局决策 捍卫政府控制国内网络活动的权利 |
In that context, the Subcommittee requested ESCAP to finance and organize seminars and training workshops on cyber law to facilitate the sharing of experiences in the development of cyber laws and to promote the importance of harmonizing the laws. | 就此 小组委员会要求亚太经社会尤其是在电子商务领域举办关于网络法律的研讨会和培训讲习班 以便就发展网络法律交流经验并宣传协调网络法律的重要性 |
Cyber threats and potential cyber warfare illustrate the increased vulnerabilities and loss of control in modern societies. Governments have mainly been concerned about hacker attacks on their own bureaucracy s information technology infrastructure, but there are social vulnerabilities well beyond government computers. | 网络空间存在的威胁和潜在的网络战争说明了现代社会中不断增加的危险性和失控 政府主要担心的是其官僚机构的信息技术基础设施被黑客们攻击 但是 还有远远超出政府电脑设备范围的社会危险性的存在 |
8. The expert from Japan reported on the establishment in 1995 of a Cyber Business Association which aims at the promotion of electronic commerce and cyber business in cooperation with the European Union, the APEC countries and the G.7 countries. | 8. 日本专家报告说 1995年建立了一个电脑工商协会 其宗旨是与欧洲联盟 亚太经合组织国家和七国集团国家合作促进电子商业和电脑工商业 |
A Cyber Café, providing independent Internet access and 30 personal computers, will be located in the Plaza. | 64. 将有网吧坐落在广场上 提供独立的网络接入和30台个人电脑 |
It is likely to take longer to conclude agreements on contentious issues such as cyber intrusions for purposes like espionage and preparing the battlefield. Nonetheless, the inability to envisage an overall cyber arms control agreement need not prevent progress on some issues now. | 就以间谍等活动为目的网络入侵和战场准备等争议问题达成协议可能还需要更长时间 尽管如此 短期内无法想象整体达成网络军控协议并不一定会阻碍现在在某些问题上取得突破 国际规则的制定一般都非常缓慢 制定核技术规则用了20年时间 最近荷兰会议最重要的信息是大规模网络漏洞已接近临界点 |
For example, a taxation and regulatory exchange would help countries to tackle tax avoidance and harmonize corporate taxation, while promoting information sharing and cooperation. Likewise, a cyber security data sharing platform could prove vital to understanding, preventing, and responding to cyber attacks. | 此外 牛津马丁委员会还建议成立自愿平台促成矛盾领域的全球性条约 比如 税收和监管交流有助于各国应对偷漏税 协调公司税 同时促进信息共享和合作 类似地 网络安全数据共享平台能在认识 防止 和应对网络攻击方面起到关键作用 |
The question of America s role in helping to produce a more benign world in 2030 has important implications for President Barack Obama as he approaches his second term. The world faces a new set of transnational challenges, including climate change, transnational terrorism, cyber insecurity, and pandemics. | 到2030年美国在创造良性世界中所起的作用对奥巴马总统的第二任任期具有重要的意义 世界正面对着气候变化 跨国恐怖主义 网络风险和流行病等一系列新的跨国挑战 所有这些问题都需要合作才能解决 |
Virtually every day brings fresh evidence that an arc of crisis from terrorism and weapons proliferation to cyber attacks and piracy is spreading from the Middle East and the Sahel to Central Asia. These risks will not disappear while NATO members focus on fixing their finances. | 几乎每天都有新证据表明 危机 从恐怖主义和武器扩散到网络攻击和海盗 范围正在从中东和萨赫勒向中亚蔓延 这些威胁不会消失 而北约成员国正专注于解决金融问题 事实是 我们的生活方式由安全和稳定决定 没有安全和稳定 就没有投资 没有就业 没有经济增长 |
So cyber weapons are dangerous by nature, but in addition, they're emerging in a much more unstable environment. | 所以网络武器 本质上是危险的 但是另一方面 它们也 是在一个很不稳定的环境下产生的 |
Given the enormous uncertainties involved, the new cyber dimensions of security must be high on every government s agenda. | 基于涉及到巨大的不确定性 解决网络安全出现的新问题必须列在每个政府重要的议程上 |
Related searches : Cyber World - Cyber Defence - Cyber Warfare - Cyber Intelligence - Cyber Liability - Cyber Safety - Cyber Secure - Cyber Cafe - Cyber Law - Cyber- Shot - Cyber Protection - Cyber Policy