Translation of "sophisticated cyber attacks" to Chinese language:


  Dictionary English-Chinese

Attacks - translation : Sophisticated - translation : Sophisticated cyber attacks - translation :

  Examples (External sources, not reviewed)

In fact, the two sides are reportedly negotiating a landmark deal that would prohibit cyber attacks against each other s vital infrastructure. An agreement on the issue could be the most important outcome of the summit, although other types of cyber attacks are unlikely to be covered by it.
中国则释放了一位人权活动家 并派了一个高规格代表团来到美国讨论网络安全问题 事实上 双方据称正在谈判一项里程碑式的协议 禁止互相网络攻击关键基础设施 在这一问题上形成协议可能是峰会最重要的成果 尽管该协议不可能覆盖其他类型的网络袭击
While the countries of the North Atlantic Treaty Organization (NATO) or similar countries such systems are generally still very secure, information warfare has attracted substantial funding in these nations and has given rise to a burgeoning vocabulary of cyber terms cyber operations, cyber attacks, cybermunitions, etc.
虽然北约组织国家和类似国家内的这种系统普遍地仍然非常安全,但信息战争在这些国家中已经吸引到大量的经费,并且因而冒出了一些电脑名词,如电脑行动 电脑攻击 电脑军火等
Law enforcement officials suggest that these attacks are not the work of mischievous hackers but of sophisticated criminal operations.
执法官员表示 这些攻击不是搞恶作剧的电脑黑客干的 而是老练的犯罪分子所为
And so there's a lot of I'm sure you've read a lot in papers, about worries about cyber attacks and defenses against those.
所以人们不免有许多 我相信你们在报纸上也看了很多 有关网络攻击 和对网络攻击的防御的担忧.
Cyber threats and potential cyber warfare illustrate the increased vulnerabilities and loss of control in modern societies. Governments have mainly been concerned about hacker attacks on their own bureaucracy s information technology infrastructure, but there are social vulnerabilities well beyond government computers.
网络空间存在的威胁和潜在的网络战争说明了现代社会中不断增加的危险性和失控 政府主要担心的是其官僚机构的信息技术基础设施被黑客们攻击 但是 还有远远超出政府电脑设备范围的社会危险性的存在
Cyber Insecurity
网络的不安全
Cyber Café
网吧
Cyber crime
网络犯罪
For example, a taxation and regulatory exchange would help countries to tackle tax avoidance and harmonize corporate taxation, while promoting information sharing and cooperation. Likewise, a cyber security data sharing platform could prove vital to understanding, preventing, and responding to cyber attacks.
此外 牛津马丁委员会还建议成立自愿平台促成矛盾领域的全球性条约 比如 税收和监管交流有助于各国应对偷漏税 协调公司税 同时促进信息共享和合作 类似地 网络安全数据共享平台能在认识 防止 和应对网络攻击方面起到关键作用
Furthermore, the insurgency has taken a more brutal turn of late, using more sophisticated weaponry, as seen in the recent suicide bombing attacks.
此外 近来叛乱活动也变得更加残忍 使用了更先进的武器 如在最近自杀式炸弹袭击中所使用的武器
The US accuses China of using cyber espionage to steal intellectual property on an unprecedented scale. Among other public sources, it could point to a study by the cyber security firm Mandiant, which traced many such attacks to a People s Liberation Army facility in Shanghai.
美国指责中国以前所未见的规模使用网络间谍盗取知识产权 美国援引的公开资源之一是网络安全公司Mandiant的一份研究 该研究跟踪到 此类袭击来自中国人民解放军在位于上海的设施 中国反驳说 它也是无处不在的网络入侵的受害者 其中许多来自美国
Cyber war and cyber espionage are largely associated with states, while cyber crime and cyber terrorism are mostly associated with non state actors. The highest costs currently stem from espionage and crime but, over the next decade or so, cyber war and cyber terrorism may become greater threats than they are today.
网络战和网络间谍大多与国家有关 与此同时 网络犯罪和网络恐怖主义往往由非国家行动者发出 目前 最大的成本来自间谍和犯罪 但是 在未来十年中 网络战和网络恐怖主义有可能成为比今天更大的威胁 此外 同盟和战术的演化 分类也可能日渐重叠 恐怖主义可以从犯罪分子那里买来恶意软件 政府可能会在背后指使
China s Cyber Warriors
中国的网络战士
Cyber War and Peace
网络战争与和平
Computer hackers attacked Georgian government Web sites in the weeks preceding the outbreak of armed conflict. The Russia Georgia conflict represents the first significant cyber attacks accompanying armed conflict.
武装冲突爆发前的数周 电脑黑客们就攻击了格鲁吉亚的一些政府网站 俄罗斯与格鲁吉亚之间的冲突是首次伴随着武装冲突的重大网络袭击 欢迎各位来到二十一世纪
For example, countries at the lower end of the digital divide were used as staging grounds to launch cyber attacks or as transit countries to mask the cybercrime trail.
例如 处于数字鸿沟底端的国家往往被用作发起电脑攻击的集结地 或作为过境国而掩盖电脑犯罪的踪迹
Although the greatest cyber threat comes from rogue states with the capacity to develop extremely sophisticated computer viruses, risks can also come from anarchistic hackers and terrorists, or even from computer glitches compounded by natural catastrophe.
虽然最大的网络威胁来源于有能力研发复杂计算机病毒的流氓国家 但风险也同样来自于信奉无政府主义的黑客和恐怖分子 甚至可能来自于因自然灾害而加剧的电脑故障
Can Cyber Warfare Be Deterred?
网络战能否被遏制
Cyber security was also being advanced.
网络安全问题也被提了出来
Consider the threat of cyber terrorism.
对网络恐怖主义的威胁进行思考
I summon the Mawefic Cyber End Dwagon!
我召喚Sin 智能終極龍!
Encourage adoption of the Council of Europe's Convention of Cyber Crime, May 2001, as the basis for standardized cyber crime efforts.
鼓励采纳欧洲委员会2001年5月的 打击网络犯罪公约 作为标准化的打击网络犯罪工作的基础
The main risk of violence created by the nature of the electricity system itself is the danger of serious power outages due to physical or cyber attacks on the increasingly fragile transmission and distribution grid.
由电力系统本身的特点所引发的主要暴力危险是由对日益脆弱的电力输配网络发起的真实或虚拟攻击所导致的严重停电事故
They're very technically sophisticated.
佢地有精密嘅科技
You're a sophisticated man.
你是个久经世故的人 应该明白颠倒也是一种天性 You're a sophisticated man.
Nonetheless, it may be possible to identify behaviors like cyber crime that are illegal in many domestic jurisdictions. Trying to limit all intrusions would be impossible, but one could start with cyber crime and cyber terrorism involving non state parties.
尽管如此 在本国司法辖区内鉴别网络犯罪等非法行为仍是可能的 阻止一切侵入或许不可行 但可以从网络犯罪和非国家行动方参与的网络恐怖主义着手 在这方面 通过同意在取证和控制方面达成一致来限制伤害符合大国的利益
The US extradited a low level Chinese official to face corruption charges. The Obama administration also decided not to announce sanctions against Chinese entities and individuals allegedly involved in cyber attacks on American companies and government agencies.
在峰会即将到来之际 美国和中国领导人都采取了积极 尽管是象征性 的举措证明各自的良好意愿 改善外交氛围 美国遣返了一名面临腐败指控的低级中国官员 奥巴马政府还决定不对被控参与对美国公司和政府机构发动网络袭击的中国单位和个人进行制裁
Every village in Africa now has a cyber cafe.
现在非洲的每一个村庄都有公共网吧
Will Governmental Folly Now Allow for a Cyber Crisis?
政府的愚蠢能否立即导致一场网络危机
Cyber activists want to meet with the Supreme Leader.
网络积极分子想跟最高领袖见面
At a time when cyber attacks are increasing worldwide, US Secretary of State Hillary Clinton was right to declare that an attack on one nation s computer networks can be an attack on all. Indeed, the attacks are a reminder that, as a new part of the global commons, cyberspace already has come under threat.
在这个全球范围内 网络攻击日渐高发的时代 美国国务卿希拉里 克林顿采取了正确的做法 她宣布对一国计算机网络所实施的攻击 将是对全体的攻击 事实上 这些攻击便是在提醒人们 网络空间这一全球公域中新的成员 已经处在了威胁之下
There are too many risks human error, technical flaws, negligence, cyber attacks, and more to believe that these weapons will never be used. Nor is there good reason to believe that adequate fail safe mechanisms are in place.
人为错误 技术缺陷 粗心大意 网络攻击等等等等 核武器有太多的风险无法排除 相信这些武器永远不会被使用是一种错误 而且也没有理由认为建立了充分的故障安全机制 1945年后的核武器史 无论在古巴导弹危机之前还是之后 随处可见侥幸逃脱的例子
Well, we're all equally sophisticated.
好 我们都同样高级
They have very sophisticated cooperation.
它们有非常复杂协作
It's nothing sophisticated. Forget it.
不过真没什么好看的 不看也罢
An egg is a beautiful, sophisticated thing that can create even more sophisticated things, such as chickens.
鸡蛋是一个美丽而复杂东西 它能创造出更加复杂东西 比如说小鸡
We called the project CyArk, which stands for Cyber Archive.
我们称之为 数字方舟 计划 代表着数字档案
But getting to 2030 without a major confrontation will be a major achievement. While the US is likely to maintain the upper hand in terms of military power for at least another 15 20 years, asymmetric warfare could undercut America s advantage should China engage in cyber attacks on US electronic and satellite systems, along with attacks on infrastructure.
就共同的外部威胁 尤其是核扩散 全球气候变化和伊斯兰极端主义进行合作或许是避免对抗的最好方法 但在不出现大规模对抗的前提下安然进入2030将是一种莫大的成就 尽管美国可能在今后至少15 20年内仍将在军事实力上占据上风 但如果中国在对美电子及卫星系统发动网络攻击的同时对美基础设施发起攻击 美国的优势可能会在非对称战争中遭到削弱
So who's the more sophisticated species?
所以到底谁是更精细高级的物种
Crew of four. Sophisticated communications sweep.
四个船员 精良的设备
She's too beautiful. She's too sophisticated.
太美丽 太成熟
Oh, you and your sophisticated ideas!
噢 你和你这些久经世故的想法
1. Have emergency warning networks regarding cyber vulnerabilities, threats and incidents.
1. 建立有关网络脆弱性 威胁和事故的紧急警报网
In America, you have the Cyber Intelligence Sharing and Protection Act.
在美国 有网络情报分享和保护法案
Let's shift to a different kind of sea, the cyber sea.
现在让我们转到另一种海洋 网络的海洋

 

Related searches : Sophisticated Attacks - Cyber Security Attacks - Cyber World - Cyber Defence - Cyber Warfare - Cyber-terrorism - Cyber Intelligence - Cyber Liability - Cyber Safety - Cyber Secure - Cyber Cafe - Cyber Terrorism