他说牵涉网络袭击的地区主要有两个:东欧和亚太。
He said generally two regions were involved in cyber attacks: Eastern Europe and the Asia Pacific.
索尼在处理网络袭击事件上承受了巨大指责。
Sony was under heavy criticism over its handling of the network intrusion.
国际货币基金组织称其遭受了一场复杂的网络袭击。
The International Monetary Fund (IMF) says it has been targeted by a sophisticated cyber attack.
针对战列舰部署和物流的网络袭击将会在后一种办法中起决定性作用。
Cyber attacks, targeting battle ship deployments and logistics, would play decisively in the latter.
这恰逢其时,尤其是考虑到近年来全球网络袭击事件的危害持续增长。
It is certainly timely, especially considering the growing power and threat of global cyber attacks.
“网络袭击没有国界,使得还击很困难。”他告诉阿拉伯半岛新闻电视台。
"You don't have nationality for cyber attacks, making retaliation hard," he told al Jazeera.
美国五角大楼证实,他们遭受一次较大的网络袭击,数千资料被外国黑客窃取。
The Pentagon has admitted it suffered a major cyber attack in which thousands of files were taken by foreign hackers.
这次网络袭击事件发生在“匿名者”组织21名成员在美国,英国和荷兰被捕之后。
The cyber attack comes days after 21 suspected members of Anonymous were arrested in the us, Britain and the Netherlands.
在一个相互关联的世界里,对一个国家的网络袭击,便可以实现对所有一切的袭击。
In an interconnected world, an attack on one nation's networks can be an attack on all.
美国国土安全部星期一提出,愿意帮助各州选举官员设法保证投票系统免受网络袭击。
The U. s. Department of Homeland Security offered Monday to help state elections officials with the challenge of securing voting systems from the threat of cyber attacks.
最近,国防部披露了2008年重大的网络袭击的新细节。那次袭击使得黑客将数据传输到外国控制的服务器。
Recently, the Defense Department revealed new details about a major cyber attack in 2008 that allowed hackers to transfer data to servers under foreign control.
某些最复杂的网络袭击是多阶段进行的,首先一个恶意软件进入电脑,让其运行,再以此电脑为平台攻击另一台机器。
Some of the most sophisticated cyberattacks are multistage, in which a piece of malware penetrates a computer to use it as a platform for attacking yet another machine.
距离二十年来的首次选举还有几天的时间,缅甸似乎成为大规模网络袭击的受害者。这次网络攻击使该国网民不能使用互联网。
With just days before its first elections for two decades, Burma appears to have become the victim of a massive cyber attack, which is blocking Internet access in the country.
外交大臣威廉•黑格(William Hague)表示,英国必须有能力保护自己免受网络袭击的危害,这是非常关键的。
The Foreign Secretary William Hague said it was crucial that the country was able to protect itself against cyber attacks.
今晚,我敦促国会通过这项议案,我们需要这项议案来更好地应对与日俱增的网络袭击威胁,抗击身份盗窃,保护孩子们的信息。
And tonight, I urge this Congress to finally pass the legislation we need to better meet the evolving threat of cyber attacks, combat identity theft, and protect our children's information.
今晚,我敦促国会通过这项议案,我们需要这项议案来更好地应对与日俱增的网络袭击威胁,抗击身份盗窃,保护孩子们的信息。
And tonight, I urge this Congress to finally pass the legislation we need to better meet the evolving threat of cyber-attacks, combat identity theft, and protect our children's information.
从这方面来考虑一下:像Stuxnet这样最复杂的网络袭击极少留下清晰的痕迹;生物武器也是一样,很难追踪到肇事者,这都是广为人知的。
Think of it this way: The most sophisticated cyberattacks, like Stuxnet, rarely leave clear fingerprints; bioweapons, too, are famously difficult to trace back to a perpetrator.
恐怖分子或敌对势力的特工可以对企业和系统发动袭击,这些企业和系统控制着一个经济体的重要部分,包括发电站、电网和通信网络。
Terrorists or agents of hostile powers could mount attacks on companies and systems that control vital parts of an economy, including power stations, electrical grids, and communications networks.
嗯,你问一下爱沙尼亚,这个星球上最依赖互联网的国家之一,2007年其网络基础设施受到持续袭击而关闭了多多少少也有两个星期。
Well, just ask Estonia, one of the most internet-dependent countries on the planet, which in 2007 was more or less shut down for two weeks by a sustained attack on its network infrastructure.
五角大楼官员理查德·劳里斯最近称,中国练就了袭击美国网络系统的“高明”本领。
Richard Lawless, a Pentagon official, recently said China had developed a "very sophisticated" ability to attack American computer and Internet systems.
恐怖袭击要求密谋者之间建立延伸的网络,在此基础上他们才能进行精心的策划与协作。这使官方机构惊骇非常。
The attacks called for meticulous planning and co-operation among an extended network of conspirators, yet apparently took the authorities entirely by surprise.
查明这些袭击的罪犯,几乎是不可能的,因为网络攻击通常会通过多层被感染的计算机进入,以掩盖其发起源头。
Identifying the culprits in such attacks can be next to impossible, because computer attacks are typically routed through multiple layers of infected computers to disguise the source.
从那时起,他发出了大约30条消息:在广播、电视或网络上,有时嘲笑美军,有时沾沾自喜,有时要求发起新的恐怖袭击。
Since then, he issued some 30 messages, in audio, video or electronic text, sometimes taunting, sometimes gloating, sometimes urging new terrorist attacks.
这也构成了一个难以解决的战略窘境:网络和生物袭击的特征就是,他们所具备的无视和躲避防御系统的能力。
And both pose a particularly difficult strategic quandary: a hallmark of cyber and bio attacks is their ability to defy deterrence and elude defenses.
黑客袭击事件之后,索尼对负责网络安全的管理人员进行了换血。
In response to the attack, Sony revamped its security management.
该报道声称该网络在100多个国家的电脑上进行过将近1300起袭击。
The report claimed the network was behind nearly 1, 300 attacks on computers in more than 100 countries.
该报道声称该网络在100多个国家的电脑上进行过将近1300起袭击。
The report claimed the network was behind nearly 1, 300 attacks on computers in more than 100 countries.
应用推荐