用英语回答不同意网络攻击 英语

当前位置: &
网络攻击的英文
英文翻译cyber attacknetwork attack&&&& electric network me ...&&&& launch an o ...&&&&cyber attack&&&&cna&&&&widely used attack tools&&&&network level attack&&&&phishing toolkits&&&&1.(进攻) launch an offensive
发起总攻击 launch a general offen ...&&&&1.[电学] electric network2.(网) graph (指一维复形); mesh&&&&not attacking not starting a war etc&&&&perpetual attack&&&&have at&&&&take a fling at&&&& der angriff&&&&attack echelons&&&&challenge virus&&&& offensive&&&&point of attack&&&&post-strike&&&& gr groun ...&&&&attack ship&&&&angle of attack&&&& offensive power&&&&total average&&&&attacking-piston
例句与用法Home computers : easy targets for cyber attacks家庭电脑:网络攻击的易选目标吗? Lifting the covers : analyzing selected network attacks攻击揭密:分析选定的网络攻击Analyze and guard against web attack process网络攻击过程分析与防范Application of fuzzy - ahp method in the effect evaluation of network attack法在网络攻击效果评估中的应用Analyzing selected network attacks分析选定的网络攻击Spect robust of a complex network under attack网络的谱分析理论,网络攻击鲁棒性研究。 Formulization of network attack pattern based on improved attack tree基于改进攻击树的网络攻击模式形式化研究( 2 ) do an in - depth research on network attack technology based trojan horse( 2 )深入研究了基于木马的网络攻击技术。 Structure design research of decision support system for reservoir flood control网络攻击智能决策支持系统的设计与实现The analysis of network attacks based on registry and the relevant safe solutions基于注册表的网络攻击分析及相应解决方案更多例句:&&1&&&&&&&&&&
相邻词汇热门词汇
网络攻击的英文翻译,网络攻击英文怎么说,怎么用英语翻译网络攻击,网络攻击的英文意思,,,发音,例句,用法和解释由查查在线词典提供,版权所有违者必究。
&&&&&&&&&&&&&&&&
Copyright &
(京ICP备号)
All rights reservedDefense department workers built what they say was the first workable model for the internet many years ago.
The goal was for U.S. universities and researchers to share information.
Later, the goal became data sharing between the U.S. and other countries.
Because of that work, and others, the world is now more connected than ever.
There is more information stored online than any of the internet’s creators could have imagined.
But that also means it is harder than ever to keep important data safe from criminals.
Steve Welby is the Defense Department’s Chief Technology Officer.
He spoke with VOA about some of the issues the department faces in protecting its information from cyber attacks.
Welby says the growth of data available on computer systems is “both an opportunity and a challenge.”
Almost everything the Department of Defense does involves some kind of software, he notes.
And if a hacker attacks a small weakness in a program, it can bring down an entire wall of cyber defense.
That is why he believes that defending cyberspace may be just as important as defending air, land, sea and space.
But that kind of work is not always easy.
James Lewis is Strategic Technologies Program Director at the Center for Strategic and International Studies.
He says the tradition of using simple “Band-Aid” solutions to correct small problems in cyber defense is a mistake.
Lewis says there are other militaries with computer experts that are as good as those in the United States.
He says hackers will eventually find ways through virtual walls if they have time and resources.
“It’s not so much that our defenses are weak,” Lewis says.
“It’s just that they are hard to defend against.”
Welby says the Defense Department is trying to develop systems that are easy to defend,
instead of turning to products from the marketplace.
Lewis says one problem the department faces is that some of its computer systems are very old.
And old systems are hard to protect.
He says, “within three years, five years, they [opponents] know
every bug, they know every opening, they know every vulnerability...”
But help could be on the way.
U.S. Defense Secretary Ash Carter is working with technology developers who may be able to improve defenses in the U.S.
Carter met last week with Elon Musk, the founder of SpaceX and product developer of Tesla Motors.
I’m Anne Ball.
五角大楼抵御网络攻击
Pentagon Battles Cyber Attacks
???-??????
双击原文单词查看解释
The United States Department of Defense developed some of the technology that led to the internet.
美国国防部开发了一些与互联网有关的技术。
Defense department workers built what they say was the first workable model for the internet many years ago. The goal was for U.S. universities and researchers to share information. Later, the goal became data sharing between the U.S. and other countries.
国防部的工作人员在数年前建了他们称之为互联网第一个可行模式的网络。建设该网的目标是供美国大学和科研人员分享信息。不久之后,这个目标就变成了在美国和其他国家之间分享数据。
Because of that work, and others, the world is now more connected than ever. There is more information stored online than any of the internet’s creators could have imagined. But that also means it is harder than ever to keep important data safe from criminals.
因为他们和别人的工作,这个世界变得比以前联系更加紧密了。在线存储的信息量,大到超过了每一位互联网缔造者的预计。但是,这也意味着,保护重要数据不受犯罪分子侵犯变得更加困难了。
Steve Welby is the Defense Department’s Chief Technology Officer. He spoke with VOA about some of the issues the department faces in protecting its information from cyber attacks.
斯蒂夫·威尔比是国防部首席技术官。他在接受“美国之声”采访时谈到了国防部在保护信息免受网络攻击时所面临的问题。
Welby says the growth of data available on computer systems is “both an opportunity and a challenge.”
威尔比说,电脑系统中可用信息的增长“既是机遇也是挑战”。
Almost everything the Department of Defense does involves some kind of software, he notes. And if a hacker attacks a small weakness in a program, it can bring down an entire wall of cyber defense. That is why he believes that defending cyberspace may be just as important as defending air, land, sea and space.
他指出,几乎国防部做的所有事情都与某种软件有关。如果黑客攻击了程序中的一个小弱点,就有可能摧毁整个网络防御系统。所以他才坚信,网络保卫战和陆海空以及宇宙空间的保卫战同样重要。
But that kind of work is not always easy.
但是这种工作往往不容易。
James Lewis is Strategic Technologies Program Director at the Center for Strategic and International Studies.
詹姆斯·路易斯是战略与国际研究中心的战略技术方案主任。
He says the tradition of using simple “Band-Aid” solutions to correct small problems in cyber defense is a mistake.
他说,传统解决网络保卫战中小问题的方法是简单的“亡羊补牢”,而这是不对的。
Lewis says there are other militaries with computer experts that are as good as those in the United States. He says hackers will eventually find ways through virtual walls if they have time and resources.
路易斯说,由电脑专家们组成的军队和美国其他的军队一样厉害。他说黑客如果有足够的时间和资源,就终究会找到办法攻破虚拟的防御系统。
“It’s not so much that our defenses are weak,” Lewis says. “It’s just that they are hard to defend against.”
“我们的防御并没有那么弱。”路易斯说,“只是敌人实在是太难防御了。”
Welby says the Defense Department is trying to develop systems that are easy to defend, instead of turning to products from the marketplace.
威尔比说国防部正在尝试开发容易防御的新系统,而不是向已经投放市场的产品寻求帮助。
Lewis says one problem the department faces is that some of its computer systems are very old. And old systems are hard to protect.
路易斯说国防部面临的一个问题就是一些电脑系统已经非常老旧了。老旧的系统很难进行防御。
He says, “within three years, five years, they [opponents] know every bug, they know every opening, they know every vulnerability...”
他说,“在三年内,五年内,敌人就会知道每一个系统弱点,每一个系统漏洞,每一处难以防御的地方……”
But help could be on the way.
但是支援已经在路上了。
U.S. Defense Secretary Ash Carter is working with technology developers who may be able to improve defenses in the U.S. Carter met last week with Elon Musk, the founder of SpaceX and product developer of Tesla Motors.
美国国防部长阿什·卡特正与技术开发者合作,这些开发者可能会增强美国的网络防御。卡特上周会见了太空探索技术公司创始人兼特斯拉汽车的产品开发工程师----艾伦·穆斯克。
I’m Anne Ball.
安妮·贝尔为您报道。
80万次下载
75万次下载
73万次下载
70万次下载
我的生词本
爱语吧网站
爱语吧 (京ICP备号)CopyRight (C)
,All rights reserved&&&&&&&&计算机英语论文网络攻击与防御
正在努力加载播放器,请稍等…
正在努力加载播放器
大小:1.09MB&&所需金币:80
&& & 金币不足怎么办?
下载量:-次 浏览量:162次
贡献时间: 18:30:00
文档标签:
已有-位用户参与评分
同类热门文档
你可能喜欢
看过这篇文档的还看过
阅读:2245&&下载:16
阅读:2027&&下载:11
阅读:645&&下载:8
阅读:760&&下载:3
阅读:80&&下载:1
阅读:399&&下载:1
阅读:207&&下载:0
阅读:63&&下载:0
阅读:167&&下载:0
阅读:86&&下载:0
该用户的其他文档
所需财富值:
80文件大小:1.09MB
您当前剩余财富值:&&
举报该文档含有违规或不良信息。
反馈该文档无法正常浏览。
举报该文档为重复文档。
举报该文档侵犯版权。
例: /help.shtml洪秀柱遭网络不雅图片攻击 吁蔡英文约束支持者-中新网
洪秀柱遭网络不雅图片攻击 吁蔡英文约束支持者
&&&&洪秀柱(资料图)中新社发 邢利宇 摄&&
  8月14日电 据台湾“中央社”报道,国民党2016“大选”参选人洪秀柱竞选办公室今天表示,受到网络不雅图片攻击,洪秀柱非常遗憾,已提告;呼吁民进党2016“大选”参选人蔡英文约束支持者行为。
  洪办上午在国民党中央党部举行记者会,发言人徐巧芯指出,今年6月10日起发现在社群网站脸书(facebook)陆续有人冒用艺人或名人账号,散布合成的不雅图片,包括洪秀柱头像被移花接木到裸照,制作成A片封面等,诋毁洪秀柱。
  她表示,冒用的脸书账号约有78个,每个账号约发3到4篇,每天有20、30则攻击图文;6月29日报警,7月17日提出补充告诉,谴责网络霸凌,也会持续用司法途径追究。
  洪办新媒体部召集人崔梅兰说,已超出网络评论时政、表达意见可容忍范围;委任律师黄士洋表示,这系列照片已超过言论自由保障限度,可能构成“刑法”的散布猥亵图文罪、公然侮辱罪及诽谤罪,甚至可能涉及“选举罢免法”意图使人不当选而散布谣言罪。
  徐巧芯说,洪秀柱觉得非常遗憾、不开心,难以接受网友透过这类低劣行为在选举中攻击,呼吁蔡英文同为女性,应约束支持者行为,共同遏止低级选风。
【编辑:朱念】
>相关新闻:
>台湾新闻精选:
直隶巴人的原贴:我国实施高温补贴政策已有年头了,但是多地标准已数年未涨,高温津贴落实遭遇尴尬。
66833 34708 30649 18963 18348 16939 12753 12482 12188 12157
 |  |  |  |  |  |  | 
本网站所刊载信息,不代表中新社和中新网观点。 刊用本网站稿件,务经书面授权。
未经授权禁止转载、摘编、复制及建立镜像,违者将依法追究法律责任。
[] [] [京公网安备:-1] [] 总机:86-10-
Copyright &
. All Rights Reserved英语学习专题
整理精选几十个类别2千多篇地道情景会话,还可进行会话强化训练..
每天一期视频节目,VOA中文部节目主持人白洁带你学习最地道的美语..
初级口语节目推荐
实战口语节目推荐
商务口语节目推荐
可可英语官方微信(微信号:ikekenet)
每天向大家推送短小精悍的英语学习资料.
添加方式1.扫描上方可可官方微信二维码。
添加方式2.搜索微信号ikekenet添加即可。

我要回帖

更多关于 不同意 英语 的文章

 

随机推荐