Cyber-security, which involves protecting both data and people, is facing multiple threats, notably cybercrime and online industrial espionage, both of which are growing rapidly.
涉及保护数据和人员的网络安全正面临多重威胁,尤其是网络犯罪和网络行业间谍,这两种威胁都在迅速增长。
"There are just super simple flaws in some medical devices," says Billy Rios of Qualys, a cyber-security firm.
网络安全公司—科利斯公司的比利·里奥斯说,“有些医疗设备刚好存在着很容易被侵入的缺陷。”
"Huawei has transparency problems" said James A.Lewis a cyber-security expert at the Center for Strategic and International Studies in Washington.
华盛顿战略和国际研究中心的网络安全专家詹姆斯•a•刘易斯说:“华为存在透明度问题。”
"Huawei has transparency problems" said James A. Lewis a cyber-security expert at the Center for Strategic and International Studies in Washington.
华盛顿战略和国际研究中心的网络安全专家詹姆斯•a•刘易斯说:“华为存在透明度问题。”
"Huawei has transparency problems," said James A. Lewis, a cyber-security expert at the Center for Strategic and International Studies in Washington.
华盛顿战略和国际研究中心的网络安全专家詹姆斯•a•刘易斯说:“华为存在透明度问题。”
Mr Rios accepts that some people think his research is designed to drum up sales for the cyber-security industry, but he insists that the risks are real.
里奥斯先生承认,有些人认为他的研究其实是用来刺激网络安全业销售的,但是他坚持,这种风险确实存在。
The problem, though, is "there's nothing that everyone agrees on," said James Lewis, cyber-security expert at the Center for Strategic and International Studies in Washington.
不过,这一问题“无法人人都能达成共识,”詹姆斯·刘易斯(James Lewis)如是说,他是总部位于华盛顿的“战略与国际研究中心”的网络安全专家。
Government should attach great importance to cyber security which is constantly under attack and is of great importance to national security.
政府应该十分重视网络安全,它不断地受到攻击,却又对于国家安全十分重要。
Cyber-threats "pose one of the gravest national-security dangers" the country is facing.
网络威胁是这个国家正面临的“最严重的国家安全威胁之一”。
The auditing side of cyber security needs candidates who might not be able to write security programs but can understand how to regulate activity.
比如网络安全的审计方面需要的人手可能不必懂编程,但却要知道如何进行规范管理。
Compounding the problem is that the department has not created a funding strategy to address its cyber security issues.
更加复杂的问题是,该机构尚未建立筹资战略,以解决其赛博安全问题。
Additionally, cyber security is being added as an integral part of strategic and operational planning for irregular and joint operations.
此外,网络安全也将成为非正规联合行动战略规划中不可或缺的组成部分。
The campaigns hired private cyber security companies to address the breaches.
竞选团队雇佣了私人的网络安全公司来解决这些漏洞。
A: I have expounded on China's position on cyber security for many times.
答:对于网络安全问题,我已多次阐明中方立场。
The cyber security of the communication protocols defined by the preceding standards.
基于先前标准所制定的网络安全通讯协议。
The “Mission Maker” initiatives for cyber security include embedding cyber security into command and control, adding it as an element of situational awareness, and enhancing information operations.
“使命制造(Mission Maker)”网络安全方案包括将网络安全嵌入到指挥控制,增加它作为态势感知要素,提高信息作战能力。
The Center will be a testing ground for everything from intelligent traffic systems to next-generation wireless networks and smart-grid cyber security systems.
中心城将会成为各种新发明——从智能交通系统到新一代无线网络技术以及智能电网网络安全系统——的试验基地。
Corporations -- especially those with online retailing--are increasing their cyber security forces as well.
公司,尤其是那些网络零售商,也在增强他们的网络安全人员人数。
The cyber security competition last Saturday was the fourth sponsored by the Neusoft Institute of Information Technology (NINT) in Guangdong.
上周六,广东东软信息技术学院(NINT)举办了第四届网络攻防大赛。
It is essential that senior management establish an expectation for strong cyber security and communicate this to their subordinate managers throughout the organization.
至关重要的是,高级管理人员建立强大的网络安全是一种期望和沟通,在整个组织其下属的经理。
As part of identifying cyber security requirements, include user agreements and notification and warning banners.
作为确定网络安全要求的一部分,包括用户协议和通知和警告标语。
This structure will promote consistent implementation and the ability to sustain a strong cyber security program.
这种结构将促进统一执行,并能够保持一个强有力的网络安全程序。
They also provide guidance regarding actions to be taken during a cyber security incident and promote efficient and effective actions during a time of crisis.
他们还提供指导意见要采取的行动,在一个网络安全事件,并促进在危机时刻效率和有效的行动。
The trouble is that most cyber security breaches — including those by nations — exploit known vulnerabilities, such as where a patch was either not developed or deployed.
问题是,多数网络安全侵入——包括国家发动的侵入——利用的是已知的漏洞,比如针对漏洞的补丁尚未开发或应用。
The trouble is that most cyber security breaches — including those by nations — exploit known vulnerabilities, such as where a patch was either not developed or deployed.
问题是,多数网络安全侵入——包括国家发动的侵入——利用的是已知的漏洞,比如针对漏洞的补丁尚未开发或应用。
应用推荐