• 牵涉网络袭击地区主要有两个东欧亚太

    He said generally two regions were involved in cyber attacks: Eastern Europe and the Asia Pacific.

    youdao

  • 索尼处理网络袭击事件承受了巨大指责

    Sony was under heavy criticism over its handling of the network intrusion.

    youdao

  • 国际货币基金组织遭受了一场复杂的网络袭击

    The International Monetary Fund (IMF) says it has been targeted by a sophisticated cyber attack.

    youdao

  • 针对战列舰部署物流网络袭击将会在后一种办法中决定性作用

    Cyber attacks, targeting battle ship deployments and logistics, would play decisively in the latter.

    youdao

  • 恰逢其时尤其是考虑到近年来全球网络袭击事件危害持续增长

    It is certainly timely, especially considering the growing power and threat of global cyber attacks.

    youdao

  • 网络袭击没有国界使得还击很困难。”告诉阿拉伯半岛新闻电视台。

    "You don't have nationality for cyber attacks, making retaliation hard," he told al Jazeera.

    youdao

  • 美国五角大楼证实,他们遭受一次较大网络袭击数千资料外国黑客窃取

    The Pentagon has admitted it suffered a major cyber attack in which thousands of files were taken by foreign hackers.

    youdao

  • 这次网络袭击事件发生匿名者”组织21成员美国英国荷兰被捕之后。

    The cyber attack comes days after 21 suspected members of Anonymous were arrested in the us, Britain and the Netherlands.

    youdao

  • 相互关联世界里国家网络袭击,便可以实现对所有一切袭击

    In an interconnected world, an attack on one nation's networks can be an attack on all.

    youdao

  • 美国国土安全部星期一提出,愿意帮助各州选举官员设法保证投票系统免受网络袭击

    The U. s. Department of Homeland Security offered Monday to help state elections officials with the challenge of securing voting systems from the threat of cyber attacks.

    youdao

  • 最近国防部披露了2008年重大网络袭击细节。那次袭击使得黑客数据传输外国控制服务器

    Recently, the Defense Department revealed new details about a major cyber attack in 2008 that allowed hackers to transfer data to servers under foreign control.

    youdao

  • 某些复杂的网络袭击阶段进行,首先恶意软件进入电脑其运行,再以此电脑平台攻击台机器

    Some of the most sophisticated cyberattacks are multistage, in which a piece of malware penetrates a computer to use it as a platform for attacking yet another machine.

    youdao

  • 距离二十年来首次选举还有几天的时间,缅甸似乎成为大规模网络袭击受害者。这次网络攻击使该国网民不能使用互联网。

    With just days before its first elections for two decades, Burma appears to have become the victim of a massive cyber attack, which is blocking Internet access in the country.

    youdao

  • 外交大臣威廉•黑格(William Hague)表示,英国必须有能力保护自己免受网络袭击的危害,这非常关键的。

    The Foreign Secretary William Hague said it was crucial that the country was able to protect itself against cyber attacks.

    youdao

  • 今晚敦促国会通过这项议案我们需要这项议案更好地应对与日俱增网络袭击威胁抗击身份盗窃保护孩子信息

    And tonight, I urge this Congress to finally pass the legislation we need to better meet the evolving threat of cyber attacks, combat identity theft, and protect our children's information.

    youdao

  • 今晚敦促国会通过这项议案我们需要这项议案更好应对与日俱增网络袭击威胁抗击身份盗窃保护孩子信息

    And tonight, I urge this Congress to finally pass the legislation we need to better meet the evolving threat of cyber-attacks, combat identity theft, and protect our children's information.

    youdao

  • 方面考虑一下:Stuxnet这样复杂网络袭击极少留下清晰痕迹;生物武器也是一样,很难追踪肇事者,这都是广为人知的。

    Think of it this way: The most sophisticated cyberattacks, like Stuxnet, rarely leave clear fingerprints; bioweapons, too, are famously difficult to trace back to a perpetrator.

    youdao

  • 恐怖分子敌对势力特工可以企业系统发动袭击,这些企业系统控制着一个经济体重要部分包括发电站电网通信网络

    Terrorists or agents of hostile powers could mount attacks on companies and systems that control vital parts of an economy, including power stations, electrical grids, and communications networks.

    youdao

  • 问一下爱沙尼亚这个星球依赖互联网国家之一,2007年网络基础设施受到持续袭击关闭多少少也两个星期

    Well, just ask Estonia, one of the most internet-dependent countries on the planet, which in 2007 was more or less shut down for two weeks by a sustained attack on its network infrastructure.

    youdao

  • 五角大楼官员理查德·劳里斯最近中国练就了袭击美国网络系统的“高明本领

    Richard Lawless, a Pentagon official, recently said China had developed a "very sophisticated" ability to attack American computer and Internet systems.

    youdao

  • 恐怖袭击要求密谋之间建立延伸网络,在此基础上他们才能进行精心策划协作。使官方机构惊骇非常。

    The attacks called for meticulous planning and co-operation among an extended network of conspirators, yet apparently took the authorities entirely by surprise.

    youdao

  • 查明这些袭击罪犯几乎是不可能的,因为网络攻击通常通过多层被感染计算机进入掩盖其发起源头

    Identifying the culprits in such attacks can be next to impossible, because computer attacks are typically routed through multiple layers of infected computers to disguise the source.

    youdao

  • 那时起发出了大约30条消息广播电视网络上,有时嘲笑美军,有时沾沾自喜,有时要求发起新的恐怖袭击

    Since then, he issued some 30 messages, in audio, video or electronic text, sometimes taunting, sometimes gloating, sometimes urging new terrorist attacks.

    youdao

  • 构成了一个难以解决战略窘境网络生物袭击特征就是他们所具备的无视和躲避防御系统能力

    And both pose a particularly difficult strategic quandary: a hallmark of cyber and bio attacks is their ability to defy deterrence and elude defenses.

    youdao

  • 黑客袭击事件之后,索尼负责网络安全管理人员进行了换血。

    In response to the attack, Sony revamped its security management.

    youdao

  • 报道声称网络100多个国家电脑上进行过将近1300起袭击

    The report claimed the network was behind nearly 1, 300 attacks on computers in more than 100 countries.

    youdao

  • 报道声称网络100多个国家电脑上进行过将近1300起袭击

    The report claimed the network was behind nearly 1, 300 attacks on computers in more than 100 countries.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定