18禁网站免费,成年人黄色视频网站,熟妇高潮一区二区在线播放,国产精品高潮呻吟AV

學習啦>學習英語>英語閱讀>英語美文欣賞>

關(guān)于安全的英語美文帶翻譯

時間: 韋彥867 分享

  安全是生命之本,安全永在我身邊。放學回家不要在外面逗留,直接回家。小編精心收集了關(guān)于安全的英語美文,供大家欣賞學習!

  關(guān)于安全的英語美文篇1

  美中兩國同意就網(wǎng)絡(luò)安全展開合作

  Senior Chinese and U.S. defense officials have agreed to cooperate on cyber security threats,despite recent accusations that China is behind several cyber attacks against U.S. networks.

  中國和美國的高層國防官員同意就應(yīng)對互聯(lián)網(wǎng)安全威脅進行合作,盡管最近有關(guān)方面指責中國策劃了幾次對美國互聯(lián)網(wǎng)網(wǎng)站的入侵。

  The announcement came Monday as China's Defense Minister Liang Guanglie met inWashington with his U.S. counterpart, Leon Panetta.

  中國國防部長梁光烈星期一在華盛頓會晤美國國防部長帕內(nèi)塔時,雙方宣布了這一意向。

  Panetta said it was important for both countries to work together on cyber security issues toavoid any future crises over digital threats.

  帕內(nèi)塔說,美中兩國共同應(yīng)對網(wǎng)絡(luò)安全問題,以避免將來數(shù)字化威脅導致的危機,具有重要意義。

  Liang said Beijing was also ready to participate in joint efforts to strengthen cybersecurity,saying China has been one of the biggest victims of cyber attacks in recent years. But he deniedaccusations that Chinese hackers were behind recent online attacks on U.S. companies andgovernment agencies.

  梁光烈說,北京也準備就緒參與加強網(wǎng)絡(luò)安全的共同努力,并表示中國是近年來網(wǎng)絡(luò)入侵的最大受害者之一。但是,梁光烈否認有關(guān)中國黑客最近入侵美國公司及政府機構(gòu)互聯(lián)網(wǎng)網(wǎng)站的指稱。

  Liang and Panetta also discussed a range of other issues, including territorial disputes in theSouth China Sea, U.S. arms sales to Taiwan, and North Korea's nuclear program. It was thefirst visit by a Chinese defense minister to the U.S. since 2003.

  梁光烈和帕內(nèi)塔還討論了一系列其他問題,包括南中國海的領(lǐng)土爭端、美國對臺軍售以及朝鮮核項目。自從2003年以來,這是中國國防部長首次訪問美國。

  關(guān)于安全的英語美文篇2

  網(wǎng)絡(luò)商業(yè)及網(wǎng)絡(luò)安全 電子心臟病

  A flaw in popular internet-security software could have serious consequences for all sorts ofbusiness

  廣泛使用的網(wǎng)絡(luò)安全軟件出現(xiàn)漏洞,可能會殃及幾乎所有企業(yè)

  THE Heartbleed bug sounds like a nasty coronary condition. But it is in fact a software flaw thathas left up to two-thirds of the world's websites vulnerable to attack by hackers. “This ispotentially the most dangerous bug that we have seen for a long, long time,” says JamesBeeson, the chief information security officer of GE Capital Americas, an arm of GE. Since itsexistence was revealed on April 7th by researchers at Codenomicon, a security outfit, andGoogle, countless companies around the world that rely on the internet for part or all of theirbusiness have been scrambling to fix the flaw.

  “心臟流血”,聽起來像是某種嚴重的心臟病的名稱。但事實上,它是一個軟件漏洞的名字,此漏洞使得全球三分之二的網(wǎng)站暴露于被黑客攻擊的危險之中。“這可能是近些年來發(fā)現(xiàn)過的最危險的漏洞了,”通用電氣旗下的通用電氣金融服務(wù)公司的首席信息安全官詹姆士·比森說道。這個漏洞是由網(wǎng)絡(luò)安全研究團隊Codenomicon和谷歌于四月七日發(fā)現(xiàn)的,自從那時起,全球范圍內(nèi),只要是或多或少依靠互聯(lián)網(wǎng)的公司,都火急火燎地在修補漏洞。

  Ironically, the bug was discovered in OpenSSL, encryption software that was designed to makethe internet more secure. Available free, this open-source code is popular with businessesand governments, which use it to help secure everything from online credit-card transactionsto public services. On April 9th, for instance, Canada's tax authority shut off public access toits online services while it checked the security of its systems in the light of news about thebug.

  諷刺的是,這個漏洞是在OpenSSl中發(fā)現(xiàn)的,而后者是一個用于提升網(wǎng)絡(luò)安全的加密軟件。OpenSSL是一個免費的開源軟件,被企業(yè)和政府部門廣泛使用,用于保護信用卡交易或公共服務(wù)的安全。比如加拿大稅務(wù)部門的提供的公眾網(wǎng)絡(luò)服務(wù)就使用了OpenSSL,在得知漏洞的存在后,稅務(wù)部門便在四月九日關(guān)閉了服務(wù)。

  The flaw makes it possible for hackers to trick a server into spewing out data held in itsmemory. OpenSSL has a feature known as a “heartbeat” that allows a computer at one end ofan encrypted link to send occasional signals to the computer at the other end of it, to checkthat it is still online. The researchers discovered that a hacker with knowledge of the bug couldreplicate this signal and use it to steal all manner of data from a remote computer.

  “心血”漏洞增加了黑客套取存儲在服務(wù)器上的數(shù)據(jù)的可能性。OpenSSL有一個名為“心跳”的功能,允許加密鏈接一端的電腦隨機發(fā)出一條信息,確認另一端的電腦是否仍然在線。研究人發(fā)現(xiàn),一個熟悉“心血”漏洞的黑客,可以通過復制這個信號來盜取遠程計算機上的所有數(shù)據(jù)。

  Those data could include encryption keys that let hackers decipher traffic. To make mattersworse, the researchers found that the bug, which is present in some versions of OpenSSL thathave been available since March 2012, allows attacks to be mounted without leaving a trace intargeted computers' “server logs”, so victims are unaware their systems have beencompromised. That means it is impossible to tell for sure what damage has been done.

  這些數(shù)據(jù)可能包括可以讓黑客解碼之前通信內(nèi)容的密鑰。更糟糕的是,研究人員發(fā)現(xiàn),此漏洞從2012起就開始在OpenSSL的一些版本中出現(xiàn);而且,黑客通過此漏洞攻擊時不會在其目標計算機的“服務(wù)器日志”中留下痕跡,所以,受害者無法察覺到自己的系統(tǒng)已經(jīng)被入侵了。

  The bug has forced companies to find out fast how many of their systems employ thevulnerable versions of OpenSSL. “Everyone knows they have to patch their customer-facinginternet websites, but that is only the tip of the iceberg,” says Jonathan Sander of STEALTHbitsTechnologies, a security firm that is helping one of America's biggest banks work out where ithas deployed the buggy software. Web-connected systems that handle things such asaccounting and personnel data will also need to be checked for the bug.

  這個漏洞促使企業(yè)迅速查明它們自己有哪些系統(tǒng)使用了存在漏洞的OpenSSL。“所有人都知道要去修補他們面向客戶的網(wǎng)站,但那些只是冰山一角,”安全公司STEALTHbits Technologies的喬納森·桑德說。該公司正在幫助美國的一家大型銀行定位其系統(tǒng)上的漏洞。其他聯(lián)網(wǎng)系統(tǒng),例如處理帳務(wù)和私人信息的聯(lián)網(wǎng)系統(tǒng),都有必要檢查一下是否有漏洞。

  Mr Sander likens the discovery of the Heartbleed bug to finding a faulty part in nearly everymake and model of car. The problem is that the internet cannot be recalled. Big web companiessuch as Google and Yahoo have moved fast to deal with the bug. But millions of smaller e-commerce sites and other businesses face the worrying prospect of being attacked by hackersalerted to the bug's existence as the firms race to fix the problem.

  桑德說,發(fā)現(xiàn)“心血”漏洞,就好比汽車廠商在它的每款車里都發(fā)現(xiàn)一個同一個缺陷。但問題是,互聯(lián)行業(yè)里沒有召回這一說。像谷歌和雅虎這樣的大型網(wǎng)絡(luò)公司已經(jīng)立即處理了漏洞。但是還有大量的小型的電商網(wǎng)站和其他類型的小公司只能一邊搶修,一邊擔心被那些獲悉漏洞存在的黑客的攻擊。

  The cure includes applying a software “patch” and then choosing new encryption keys toreplace those that may have been compromised. Once this has been done, customers will oftenneed to change their passwords too. Tumblr, a blogging service owned by Yahoo, has urged itsusers to change the passwords they use for all of the secure online services that holdsensitive data about them. Some companies even chose to suspend services while they wereworking on a fix. Bitstamp, a Bitcoin e-currency exchange, temporarily suspended newaccount registrations and logins to its existing accounts.

  補救的辦法包括給軟件打“補丁”,然后用新密鑰替換那些可能被盜取的密鑰。完成了這兩步之后,用戶通常還需要更改他們的密碼。雅虎旗下提供博客服務(wù)的Tumblr就強烈建議用戶更改所有包含他們敏感信息的服務(wù)的密碼。有些公司甚至在其修補漏洞期間暫停了服務(wù)。比特幣交易網(wǎng)站Bitstamp就暫時關(guān)閉了注冊和登錄服務(wù)。

  Another Y2 K?

  另一個千年蟲?

  Perhaps the risk posed by the Heartbleed bug will turn out to be overblown. But if it emergesthat companies' systems have indeed been hacked because of it, this could open a legal can ofworms. Firms could argue that they ought not to be punished for using widely trusted securitysoftware. But aggrieved customers—and their lawyers—may see things differently.

  也許,“心血”漏洞可能造成的風險被夸大了。但是一旦真的有公司因此漏洞被黑客入侵了,就可能引起極為棘手的法律糾紛。企業(yè)可能會自辯說其不應(yīng)該因使用被廣泛信任的安全軟件受罰。但受害的用戶和他們的律師可不會這么想。

  Quite how the bug got into the OpenSSL software in the first place is a mystery. BruceSchneier, an internet-security expert, argues in a blog post that “the probability is close toone” that intelligence agencies have exploited the glitch to nab the encryption keys needed todecipher information about their targets. His guess is that the glitch is the result of a codingerror rather than the handiwork of spies, though he says he cannot be sure.

  至于究竟這個漏洞最初是如何出現(xiàn)在OpenSSL中的,這還是一個謎。網(wǎng)絡(luò)安全專家布魯斯·施奈爾在他的一篇博客里稱,“毫無疑問”,情報部門已利用此漏洞盜取密鑰以獲取其監(jiān)控目標的信息。雖然他不能完全肯定,但他認為漏洞是編程失誤的結(jié)果,不太可能是間諜的杰作。

  No matter who is to blame, this episode is another reminder of the security challengescompanies face as ever more economic activity shifts online. According to eMarketer, a researchoutfit, worldwide business-to-consumer e-commerce sales are likely to grow by just over afifth this year, to class="main">

關(guān)于安全的英語美文帶翻譯

時間: 韋彥867 分享

  不管幕后黑手到底是誰,這個事件再一次提醒我們,在企業(yè)不斷將經(jīng)濟活動向線上轉(zhuǎn)移的過程中,它們將面臨大量的安全挑戰(zhàn)。據(jù)一個名為eMarketer的市場調(diào)查公司稱,今年全球B2C電商的銷售總額將有望達到1.5萬億美元,同比增長超過五分之一。這是巨大的商機,同時也會讓網(wǎng)絡(luò)罪犯們更堅定地咬住企業(yè)這塊肥肉。就讓董事會的老爺們?yōu)榇藷母C火吧。

  關(guān)于安全的英語美文篇3

  Cyber-security

  網(wǎng)絡(luò)安全

  The internet of things (to be hacked)

  (或?qū)⒃庥龊诳偷?物聯(lián)網(wǎng)

  Hooking up gadgets to the web promises huge. But security must not be an afterthought

  將各種東西交聯(lián)到互聯(lián)網(wǎng)上似乎前景極大,但首先應(yīng)該考慮到安全問題。

  CYBER-SECURITY is now part of all our lives. “Patches” and other security updates arrive forphones, tablets and PCs. Consultants remind us all not to open unknown files or plugunfamiliar memory sticks into our computers. The bosses of some Western firms throw awayphones and laptops after they have been to China assuming they have been hacked. And yet,as our special report this week points out, digital walls keep on being breached. Last year morethan 800m digital records, such as credit- and debit-card details, were pinched or lost, morethan three times as many as in 2012. According to a recent estimate by the Centre for Strategicand International Studies, a think-tank, the cost to the global economy of cybercrime andonline industrial espionage stands at 445 billion a year—about as much as the GDP of Austria.

  如今,網(wǎng)路安全與我們每個人息息相關(guān)。手機、平板電腦以及個人電腦上的各種“補丁”以及其他的安全更新應(yīng)運而生。安全顧問提醒我們不要打開未知文件或?qū)⒛吧挠洃洶暨B接到自己的電腦上。一些西方公司的老板如果在中國遭遇黑客,他們就會將手機跟筆記本電腦扔掉。正如本周的特別報道中指出的,數(shù)字墻正遭受著源源不斷的攻擊。去年,諸如信用卡和借記卡記錄在內(nèi)的超過800m的數(shù)字文件被刪除或丟失,是2012年的三倍之多。據(jù)戰(zhàn)略和國家問題研究中心—一個智庫—最新評估稱,全球經(jīng)濟網(wǎng)絡(luò)犯罪和網(wǎng)絡(luò)工業(yè)間諜活動一年耗資為4450億美元,將近奧地利的GDP。

  Now a new phase in this contest is emerging: “the internet of things”. This involvesembedding miniature computers in objects and connecting them to the internet using wirelesstechnology. Cisco, a technology company, predicts that 50 billion connected devices will be incirculation by the end of the decade, up from 11 billion last year. Web-connected cars andsmart appliances in homes are becoming more common, as are medical devices that can bemonitored by doctors many miles from their patients. Tech companies are splurging cash:witness Google's punt on driverless cars and the 3.2 billion it has spent buying Nest, a makerof smart thermostats.

  如今,這場對抗的新階段正在形成——即物聯(lián)網(wǎng)。包括將微型計算器嵌入物體中并利用無線技術(shù)將他們連入互聯(lián)網(wǎng)。思科技術(shù)公司預測,在去年110億的基礎(chǔ)上,2020年底以前將有500億連接裝置處于流通。聯(lián)網(wǎng)汽車和智能家電以及能供醫(yī)生遠距離監(jiān)控病人的醫(yī)療裝置越來越普遍??萍脊境饩拶Y于此,例如谷歌投資無人駕駛汽車并花費32億美元收購智能恒溫器公司Nest。

  Such connectivity offers many advantages, from being able to adjust your house's heatingwhen you are in the office to alerting your doctor that your insulin level has risen. But it alsogives malicious hackers an easy way to burrow deeper into people's lives. The small,embedded computers at the centre of the internet of things do not have as much processingpower or memory as, say, a smartphone, so security software on them tends to berudimentary. There have already been instances of nefarious types taking control ofwebcams, televisions and even a fridge, which was roped into a network of computers pumpingout e-mail spam. And security researchers have found ways of hacking into some kinds ofmedical devices and cars, though this still requires specialist knowledge and kit. The wirelessheart monitor of Dick Cheney, America's former vice-president, was modified to stop remoteassassination attempts.

  這樣連通性提供了許多好處,例如當你在辦公室就能夠調(diào)節(jié)房子的供暖設(shè)備,又或是在你的胰島素水平上升時提醒醫(yī)生。但同時它也使得惡意黑客們很容易就深入挖掘到人們的生活。物聯(lián)網(wǎng)中心的小型嵌入式計算機沒有像只能手機那樣的多處理能力或內(nèi)存,所以往往需要安全軟件。已經(jīng)有通過網(wǎng)絡(luò)群發(fā)垃圾郵件控制攝像頭、電視甚至冰箱的例子。盡管需要專業(yè)的知識和裝備,安全研究人員仍發(fā)現(xiàn)一些侵入某些醫(yī)療設(shè)備和汽車的方法。美國前副總統(tǒng)迪克·切尼的無線心臟監(jiān)視器就是通過修改來停止遠程暗殺的。

  Beware the fridge in Ealing

  當心伊林的冰箱

  For the companies building the internet of things, its vulnerability could be costly. The tacticof pumping out new software as fast as possible and then issuing patches later to fix flaws inthe code may be tolerable if all that is lost is data, but if it involves personal safety, consumerswill be less tolerant. In order to avoid lurid headlines about cars crashing, insulin overdosesand houses burning, tech firms will surely have to embrace higher standards. Just as withcomputers and phones, there will be more passwords and more updates, though that maymake the internet of things less easy to use—a blow for a business based on making life moreconvenient.

  對于構(gòu)建物聯(lián)網(wǎng)的公司而言,計算機的漏洞可能會使其付出巨大代價。如果只是丟失了數(shù)據(jù),盡快推出新的軟件然后發(fā)布補丁修復代碼中的缺陷這一策略是可以被接受,但如果涉及到人身安全,消費者將不會那么寬容了。為了避免關(guān)于撞車、胰島素過量以及房屋失火等聳人聽聞的標題,科技公司必將執(zhí)行更高的標準。就像電腦和電話,物聯(lián)網(wǎng)將會需要更多的密碼和更新,盡管使用上不再方便,但這是為了使生活有更多的便利。

  For governments, the temptation will be to panic and do too much. They should make clearthat web-connected gadgets are covered by existing safety laws and existing product-liabilityregimes: last year Japan's Toyota was successfully sued for installing malfunctioning, but notweb-connected, software. Wrongdoers should be punished, but the best prompt for securingthe internet of things is competition. Either tech firms will find ways to make web-connectedgadgets more dependable, or people will decide they can live without them. Who needs asmart fridge anyway?

  對于政府來說,這種誘惑是危與機并存的。他們理應(yīng)明確上網(wǎng)設(shè)備是由現(xiàn)有的安全法律、現(xiàn)有的產(chǎn)品責任制度所涵蓋。去年日本豐田成功起訴了安裝故障而不是網(wǎng)絡(luò)連接或軟件。違法者應(yīng)該受到懲罰,但保障物聯(lián)網(wǎng)的最好方式是競爭。是科技公司設(shè)法使上網(wǎng)設(shè)備更可靠,還是人們決定他們生活中是否應(yīng)該依賴于此?到底是誰需要一個智能冰箱呢?

  
看了“關(guān)于安全的英語美文”的人還看了:

1.有關(guān)于安全的英語美文

2.關(guān)于安全的英語美文欣賞

3.關(guān)于安全方面的英語美文

4.關(guān)于安全的英語美文大全

5.關(guān)于安全的英語小短文欣賞

2560740