Translation of "security vulnerabilities" to Chinese language:


  Dictionary English-Chinese

Security - translation : Security vulnerabilities - translation :

  Examples (External sources, not reviewed)

The meeting focused on the follow up of two studies conducted by the Department of Economic and Social Affairs on economic vulnerabilities and human security and by UNDP on ecological vulnerabilities and human security, respectively.
会议的重点是落实经济和社会事务部就经济脆弱性和人类安全以及开发计划署就生态脆弱性和人类安全编写的两份研究报告
Israel apos s national security doctrine and capabilities are designed to offset these strategic vulnerabilities and disadvantageous disparities.
以色列的国家安全理论和能力正是为了抵销这种战略上的脆弱性和不利的差距的
But as we continue to build a global nuclear security framework, it is important that we develop a clearer overall picture of remaining security vulnerabilities.
但随着我们继续建立全球核安全框架 重要的是 我们必须对仍然存在的安全隐患有一个更清楚的全面认识
This would also enable the Mission to provide adequate security for United Nations personnel and facilities, and mitigate some UNOCI vulnerabilities.
这样 特派团可以有能力向联合国人员以及设施提供充分的安全保障 减少联科行动的一些脆弱环节
Our assessment recommends that appropriate adjustments be made to the Security Council's previous strategy, taking into account the progress achieved and the existing vulnerabilities.
我们的评估是 应当对安全理事会先前的战略作出适当的调整 要考虑到所取得的进展以及现有的脆弱性
We pay the price for each others' vulnerabilities.
我们须为彼此的薄弱环节付出代价
The development of a comprehensive plan was delayed pending the conclusion in December 2004 of the security risk assessment undertaken to identify network and system vulnerabilities.
在2004年12月完成旨在发现网络和系统弱点的安全风险评估工作之前 制订全面计划的工作被推迟
Food security Parties pointed out that many measures addressing vulnerabilities in one sector also had co benefits in other sectors that are vulnerable to climate change.
18. 缔约方指出许多解决一个部门脆弱性的措施也有利于对气候变化脆弱的其它部门
(i) Reassessment. Participants should review and reassess the security of information systems and networks and should make appropriate modifications to security policies, practices, measures and procedures that include addressing new and changing threats and vulnerabilities.
(i) 再行评估 参与者应审查和再行评估信息系统和网络的安全 并对安全政策 惯例 措施和程序作出适当的修改 以便应付新的 不断演变的威胁和弱点
Yet each of the region s states has important security concerns and vulnerabilities. Iran, a multiethnic state whose rulers have struggled to advance national cohesion, is no different.
然而 该地区的每个国家都有重要的安全担忧和脆弱性 伊朗也不例外 作为一个多种族的国家 其统治者一直在挣扎中推进民族凝聚力
Thus, structural vulnerabilities should be compensated for by offsetting capabilities.
因此 应当通过抵消能力来弥补结构上的脆弱性
1. Have emergency warning networks regarding cyber vulnerabilities, threats and incidents.
1. 建立有关网络脆弱性 威胁和事故的紧急警报网
Figure 3. Percentage of Parties reporting on key vulnerabilities by sector
图3. 报告了关键部门脆弱性的缔约方百分比
Wu Haisang said that if the device itself has security holes, or the protection mechanism is not perfect, hackers can control personal devices remotely through vulnerabilities, backdoors, and so on.
伍海桑说 如果设备本身有安全漏洞 或保护机制不完善 黑客完全可以通过漏洞 后门等来远程操控个人的设备
Poverty, gender inequality and exploitation are at the root of these vulnerabilities.
贫穷 两性不平等和被剥削是他们易受感染的根源
Poverty, gender inequality and exploitation are at the root of those vulnerabilities.
贫穷 性别不平等和剥削是这种易受感染现象的根源
Small island developing States have special vulnerabilities which threaten their very existence.
小岛屿发展中国家有些特别薄弱环节威胁着它们的存在
Noting that, as a result of increasing interconnectivity, critical information infrastructures are now exposed to a growing number and a wider variety of threats and vulnerabilities that raise new security concerns,
注意到由于互联日增 重要信息基础设施如今所面临的威胁和暴露的弱点日益增加 形式也更为多样 从而提出了新的安全问题
As I mentioned earlier, the Agency's nuclear security assistance efforts to date have been focused, by necessity, on helping States identify and address vulnerabilities, upgrading physical protection, and securing high priority radioactive sources.
正如我在早些时候提到的 到目前为止 原子能机构的核安全援助努力 出于必要 始终侧重于帮助各国查明和解决薄弱环节 加强实特保护 确保放射性来源受到高度优先考虑
Noting that, as a result of increasing interconnectivity, information systems and networks are now exposed to a growing number and a wider variety of threats and vulnerabilities which raise new security issues for all,
注意到由于互连性日增 信息系统和网络目前所遭受的威胁和暴露的弱点日益增加 形式也更为广泛 为所有人提出了新的安全问题
Its future work will take into account existing vulnerabilities of groups, communities and other stakeholders.
专家组的今后工作将考虑到各人群 社区和其他利益攸关者现有的脆弱性
Targets regarding adolescents' protection needs and special vulnerabilities are contained in focus areas 3 and 4.
有关青少年保护需要和特别脆弱性的具体目标 也列入了重点领域3和4
International terrorism requires an international response otherwise, we all pay the price for each other's vulnerabilities.
必须对国际恐怖主义做出国际反应 否则 我们所有人都将因各方的弱点而付出代价
A large coalition of technology companies and civil society organizations recently sent a letter to President Barack Obama arguing against backdoors. In addition to undermining every American s cyber security and the nation s economic security, the signers argued, introducing new vulnerabilities to weaken encrypted products in the US would also undermine human rights and information security around the globe.
最近 一个由科技公司和公民社会组织组成的大联盟致信总统奥巴马反对后门 除了 危及每一位美国人的网络安全和国家的经济安全 联署者指出 引入新弱点削弱美国加密产品还将损害全球人权和信息安全
Not surprisingly, the US government s national security officials oppose full encryption by American technology companies, arguing that the country will be less safe if the proper authorities have no backdoor a piece of code that lets them in. Software engineers call backdoors vulnerabilities, deliberate efforts to weaken security.
毫不奇怪 美国政府国家安全部门反对美国科技公司进行充分加密 指出如果有关部门得不到 后门 让它们窥探信息的代码 美国的安全就得不到保障 软件工程师将后门称为 弱点 即刻意削减安全性的措施 他们认为 要求留下后门就好比要求汽车制造商采用有缺陷的发动机
Cyber threats and potential cyber warfare illustrate the increased vulnerabilities and loss of control in modern societies. Governments have mainly been concerned about hacker attacks on their own bureaucracy s information technology infrastructure, but there are social vulnerabilities well beyond government computers.
网络空间存在的威胁和潜在的网络战争说明了现代社会中不断增加的危险性和失控 政府主要担心的是其官僚机构的信息技术基础设施被黑客们攻击 但是 还有远远超出政府电脑设备范围的社会危险性的存在
Action is also required to address the special needs and vulnerabilities of women and children in such situations.
在这种情况下,还必须采取行动注意妇女和儿童的特殊需求及易受伤害性
The key vulnerabilities included sectors areas, such as agriculture and food security, water resources, coastal zones and marine ecosystems, terrestrial ecosystems (forests, rangelands, etc.), human health and human settlements, fisheries, and others such as biodiversity, infrastructure, coral reefs, tourism and energy.
关键脆弱性涵盖一些部门 领域 诸如农业和粮食安全 水资源 沿岸带和海洋生态系统 陆地生态系统(森林 牧场等等) 人类健康和人类住区 渔业 以及生物多样性 基础设施 珊瑚礁 旅游业和能源等其他事项
Expressing dismay at the ability of criminal networks to avoid punishment while preying on the vulnerabilities of their victims,
不安地注意到犯罪网络利用被害人的脆弱处境营利但却不受惩罚的能力
Second, it was vital to reach a common understanding as to the Organization's vulnerabilities and the threats it faced.
第二 对本组织的脆弱性及它面临的威胁达成共同了解是极重要的
Information provided by Parties on current and future key vulnerabilities was dependent on the relative importance to their economy.
缔约方就当前和未来关键脆弱性提供的信息取决于对其经济的相对重要性
The purpose was to launch a platform from which to assess vulnerabilities and initiate and establish future common CPDs.
目的是启动一个平台 以此评估脆弱程度 启动及编写将来的共同国家方案文件
We are heartened, too, by the reaffirmation of the Member States' commitment to address these special needs and vulnerabilities.
而且 我们感到鼓舞的是 各会员国重申 它们承诺处理这些特殊需要和弱点
The Mauritius Strategy advocated specific action to strengthen the capacity of small island developing States to address their vulnerabilities.
2. 毛里求斯战略 主张采取具体行动 加强小岛屿发展中国家解决其脆弱性问题的能力
(c) Response. Participants should act in a timely and cooperative manner to prevent, detect and respond to security incidents. They should share information about threats and vulnerabilities, as appropriate, and implement procedures for rapid and effective cooperation to prevent, detect and respond to security incidents. This may involve cross border information sharing and cooperation
(c) 反应 参与者应及时地协力预防和侦查安全事件并对这些事件作出反应 他们应酌情分享关于威胁和脆弱性的信息 实施开展迅速 有效合作的程序 预防和侦查安全事件并对这些事件作出反应 这方面可能涉及跨边界的信息分享和合作
The Review Conference offered an opportunity to acknowledge the vulnerabilities of all and focus on shared goals, to put in place a paradigm of a new collective security system to achieve those goals and enable all to live in freedom and dignity.
审议大会提供了一个认识各方脆弱之处和着力追求共同目标的机会 通过这次大会 可以确立新的集体安全体系模式 从而实现这些目标并使所有人自由和尊严地生存
Noting that the global environment continues to suffer degradation, adding to economic and social vulnerabilities, in particular in developing countries,
注意到全球环境继续退化 加剧了特别是发展中国家的经济和社会方面的脆弱性
12. Stresses the need to address risk reduction of and vulnerabilities to all natural hazards including geological and hydrometeorological hazards
12. 强调必须研究解决减少所有自然危害 包括地质和水文危害的风险问题 以及容易引起这些危害的脆弱性问题
Ensure that the rule based multilateral trading system properly takes into consideration the economic vulnerabilities of small island developing States.
确保基于规则的多边贸易体系适当考虑到小岛屿发展中国家经济的脆弱性
Due to their vulnerabilities, those countries are in very difficult and special situations compared to the rest of the world.
这些国家由于其易受伤害性 同世界其他地区相比处于非常困难和特殊的状态中
Also underlines the need to give special attention to the vulnerabilities and capacities of marginalized groups of women and girls
6. 又着重指出必须特别注意处于边缘地位的妇女和女孩群体易受伤害的特点和她们的能力
Noting that the global environment continues to suffer degradation, adding to economic and social vulnerabilities, in particular in developing countries,
注意到全球环境继续退化 加剧了经济和社会方面的脆弱性 在发展中国家尤其如此
Noting that the global environment continues to suffer degradation, adding to economic and social vulnerabilities, in particular in developing countries,
注意到全球环境继续退化 加剧了经济和社会方面的脆弱性 在发展中国家尤其如此
The same vulnerabilities may also come to be exploited by terrorist organizations, with potentially even greater and more unpredictable negative consequences.
恐怖主义组织也会利用这些弱点 可能造成更加严重和更难以预料的有害后果
The Indian Ocean tsunami has yet again demonstrated the extent of the vulnerabilities faced by small island States like the Maldives.
印度洋海啸再次表明了像马尔代夫这样的小岛屿国家面临的脆弱性的程度

 

Related searches : Critical Vulnerabilities - Software Vulnerabilities - Exploitable Vulnerabilities - Key Vulnerabilities - System Vulnerabilities - Application Vulnerabilities - Address Vulnerabilities - External Vulnerabilities - Financial Vulnerabilities - Mitigate Vulnerabilities - Underlying Vulnerabilities - Network Vulnerabilities - Economic Vulnerabilities - Potential Vulnerabilities