不卡AV在线|网页在线观看无码高清|亚洲国产亚洲国产|国产伦精品一区二区三区免费视频

學(xué)習(xí)啦>學(xué)習(xí)英語(yǔ)>英語(yǔ)閱讀>英語(yǔ)美文欣賞>

關(guān)于安全的英語(yǔ)美文帶翻譯

時(shí)間: 韋彥867 分享

  安全是生命之本,安全永在我身邊。放學(xué)回家不要在外面逗留,直接回家。小編精心收集了關(guān)于安全的英語(yǔ)美文,供大家欣賞學(xué)習(xí)!

  關(guān)于安全的英語(yǔ)美文篇1

  美中兩國(guó)同意就網(wǎng)絡(luò)安全展開(kāi)合作

  Senior Chinese and U.S. defense officials have agreed to cooperate on cyber security threats,despite recent accusations that China is behind several cyber attacks against U.S. networks.

  中國(guó)和美國(guó)的高層國(guó)防官員同意就應(yīng)對(duì)互聯(lián)網(wǎng)安全威脅進(jìn)行合作,盡管最近有關(guān)方面指責(zé)中國(guó)策劃了幾次對(duì)美國(guó)互聯(lián)網(wǎng)網(wǎng)站的入侵。

  The announcement came Monday as China's Defense Minister Liang Guanglie met inWashington with his U.S. counterpart, Leon Panetta.

  中國(guó)國(guó)防部長(zhǎng)梁光烈星期一在華盛頓會(huì)晤美國(guó)國(guó)防部長(zhǎng)帕內(nèi)塔時(shí),雙方宣布了這一意向。

  Panetta said it was important for both countries to work together on cyber security issues toavoid any future crises over digital threats.

  帕內(nèi)塔說(shuō),美中兩國(guó)共同應(yīng)對(duì)網(wǎng)絡(luò)安全問(wèn)題,以避免將來(lái)數(shù)字化威脅導(dǎo)致的危機(jī),具有重要意義。

  Liang said Beijing was also ready to participate in joint efforts to strengthen cybersecurity,saying China has been one of the biggest victims of cyber attacks in recent years. But he deniedaccusations that Chinese hackers were behind recent online attacks on U.S. companies andgovernment agencies.

  梁光烈說(shuō),北京也準(zhǔn)備就緒參與加強(qiáng)網(wǎng)絡(luò)安全的共同努力,并表示中國(guó)是近年來(lái)網(wǎng)絡(luò)入侵的最大受害者之一。但是,梁光烈否認(rèn)有關(guān)中國(guó)黑客最近入侵美國(guó)公司及政府機(jī)構(gòu)互聯(lián)網(wǎng)網(wǎng)站的指稱(chēng)。

  Liang and Panetta also discussed a range of other issues, including territorial disputes in theSouth China Sea, U.S. arms sales to Taiwan, and North Korea's nuclear program. It was thefirst visit by a Chinese defense minister to the U.S. since 2003.

  梁光烈和帕內(nèi)塔還討論了一系列其他問(wèn)題,包括南中國(guó)海的領(lǐng)土爭(zhēng)端、美國(guó)對(duì)臺(tái)軍售以及朝鮮核項(xiàng)目。自從2003年以來(lái),這是中國(guó)國(guó)防部長(zhǎng)首次訪(fǎng)問(wèn)美國(guó)。

  關(guān)于安全的英語(yǔ)美文篇2

  網(wǎng)絡(luò)商業(yè)及網(wǎng)絡(luò)安全 電子心臟病

  A flaw in popular internet-security software could have serious consequences for all sorts ofbusiness

  廣泛使用的網(wǎng)絡(luò)安全軟件出現(xiàn)漏洞,可能會(huì)殃及幾乎所有企業(yè)

  THE Heartbleed bug sounds like a nasty coronary condition. But it is in fact a software flaw thathas left up to two-thirds of the world's websites vulnerable to attack by hackers. “This ispotentially the most dangerous bug that we have seen for a long, long time,” says JamesBeeson, the chief information security officer of GE Capital Americas, an arm of GE. Since itsexistence was revealed on April 7th by researchers at Codenomicon, a security outfit, andGoogle, countless companies around the world that rely on the internet for part or all of theirbusiness have been scrambling to fix the flaw.

  “心臟流血”,聽(tīng)起來(lái)像是某種嚴(yán)重的心臟病的名稱(chēng)。但事實(shí)上,它是一個(gè)軟件漏洞的名字,此漏洞使得全球三分之二的網(wǎng)站暴露于被黑客攻擊的危險(xiǎn)之中。“這可能是近些年來(lái)發(fā)現(xiàn)過(guò)的最危險(xiǎn)的漏洞了,”通用電氣旗下的通用電氣金融服務(wù)公司的首席信息安全官詹姆士·比森說(shuō)道。這個(gè)漏洞是由網(wǎng)絡(luò)安全研究團(tuán)隊(duì)Codenomicon和谷歌于四月七日發(fā)現(xiàn)的,自從那時(shí)起,全球范圍內(nèi),只要是或多或少依靠互聯(lián)網(wǎng)的公司,都火急火燎地在修補(bǔ)漏洞。

  Ironically, the bug was discovered in OpenSSL, encryption software that was designed to makethe internet more secure. Available free, this open-source code is popular with businessesand governments, which use it to help secure everything from online credit-card transactionsto public services. On April 9th, for instance, Canada's tax authority shut off public access toits online services while it checked the security of its systems in the light of news about thebug.

  諷刺的是,這個(gè)漏洞是在OpenSSl中發(fā)現(xiàn)的,而后者是一個(gè)用于提升網(wǎng)絡(luò)安全的加密軟件。OpenSSL是一個(gè)免費(fèi)的開(kāi)源軟件,被企業(yè)和政府部門(mén)廣泛使用,用于保護(hù)信用卡交易或公共服務(wù)的安全。比如加拿大稅務(wù)部門(mén)的提供的公眾網(wǎng)絡(luò)服務(wù)就使用了OpenSSL,在得知漏洞的存在后,稅務(wù)部門(mén)便在四月九日關(guān)閉了服務(wù)。

  The flaw makes it possible for hackers to trick a server into spewing out data held in itsmemory. OpenSSL has a feature known as a “heartbeat” that allows a computer at one end ofan encrypted link to send occasional signals to the computer at the other end of it, to checkthat it is still online. The researchers discovered that a hacker with knowledge of the bug couldreplicate this signal and use it to steal all manner of data from a remote computer.

  “心血”漏洞增加了黑客套取存儲(chǔ)在服務(wù)器上的數(shù)據(jù)的可能性。OpenSSL有一個(gè)名為“心跳”的功能,允許加密鏈接一端的電腦隨機(jī)發(fā)出一條信息,確認(rèn)另一端的電腦是否仍然在線(xiàn)。研究人發(fā)現(xiàn),一個(gè)熟悉“心血”漏洞的黑客,可以通過(guò)復(fù)制這個(gè)信號(hào)來(lái)盜取遠(yuǎn)程計(jì)算機(jī)上的所有數(shù)據(jù)。

  Those data could include encryption keys that let hackers decipher traffic. To make mattersworse, the researchers found that the bug, which is present in some versions of OpenSSL thathave been available since March 2012, allows attacks to be mounted without leaving a trace intargeted computers' “server logs”, so victims are unaware their systems have beencompromised. That means it is impossible to tell for sure what damage has been done.

  這些數(shù)據(jù)可能包括可以讓黑客解碼之前通信內(nèi)容的密鑰。更糟糕的是,研究人員發(fā)現(xiàn),此漏洞從2012起就開(kāi)始在OpenSSL的一些版本中出現(xiàn);而且,黑客通過(guò)此漏洞攻擊時(shí)不會(huì)在其目標(biāo)計(jì)算機(jī)的“服務(wù)器日志”中留下痕跡,所以,受害者無(wú)法察覺(jué)到自己的系統(tǒng)已經(jīng)被入侵了。

  The bug has forced companies to find out fast how many of their systems employ thevulnerable versions of OpenSSL. “Everyone knows they have to patch their customer-facinginternet websites, but that is only the tip of the iceberg,” says Jonathan Sander of STEALTHbitsTechnologies, a security firm that is helping one of America's biggest banks work out where ithas deployed the buggy software. Web-connected systems that handle things such asaccounting and personnel data will also need to be checked for the bug.

  這個(gè)漏洞促使企業(yè)迅速查明它們自己有哪些系統(tǒng)使用了存在漏洞的OpenSSL。“所有人都知道要去修補(bǔ)他們面向客戶(hù)的網(wǎng)站,但那些只是冰山一角,”安全公司STEALTHbits Technologies的喬納森·桑德說(shuō)。該公司正在幫助美國(guó)的一家大型銀行定位其系統(tǒng)上的漏洞。其他聯(lián)網(wǎng)系統(tǒng),例如處理帳務(wù)和私人信息的聯(lián)網(wǎng)系統(tǒng),都有必要檢查一下是否有漏洞。

  Mr Sander likens the discovery of the Heartbleed bug to finding a faulty part in nearly everymake and model of car. The problem is that the internet cannot be recalled. Big web companiessuch as Google and Yahoo have moved fast to deal with the bug. But millions of smaller e-commerce sites and other businesses face the worrying prospect of being attacked by hackersalerted to the bug's existence as the firms race to fix the problem.

  桑德說(shuō),發(fā)現(xiàn)“心血”漏洞,就好比汽車(chē)廠商在它的每款車(chē)?yán)锒及l(fā)現(xiàn)一個(gè)同一個(gè)缺陷。但問(wèn)題是,互聯(lián)行業(yè)里沒(méi)有召回這一說(shuō)。像谷歌和雅虎這樣的大型網(wǎng)絡(luò)公司已經(jīng)立即處理了漏洞。但是還有大量的小型的電商網(wǎng)站和其他類(lèi)型的小公司只能一邊搶修,一邊擔(dān)心被那些獲悉漏洞存在的黑客的攻擊。

  The cure includes applying a software “patch” and then choosing new encryption keys toreplace those that may have been compromised. Once this has been done, customers will oftenneed to change their passwords too. Tumblr, a blogging service owned by Yahoo, has urged itsusers to change the passwords they use for all of the secure online services that holdsensitive data about them. Some companies even chose to suspend services while they wereworking on a fix. Bitstamp, a Bitcoin e-currency exchange, temporarily suspended newaccount registrations and logins to its existing accounts.

  補(bǔ)救的辦法包括給軟件打“補(bǔ)丁”,然后用新密鑰替換那些可能被盜取的密鑰。完成了這兩步之后,用戶(hù)通常還需要更改他們的密碼。雅虎旗下提供博客服務(wù)的Tumblr就強(qiáng)烈建議用戶(hù)更改所有包含他們敏感信息的服務(wù)的密碼。有些公司甚至在其修補(bǔ)漏洞期間暫停了服務(wù)。比特幣交易網(wǎng)站Bitstamp就暫時(shí)關(guān)閉了注冊(cè)和登錄服務(wù)。

  Another Y2 K?

  另一個(gè)千年蟲(chóng)?

  Perhaps the risk posed by the Heartbleed bug will turn out to be overblown. But if it emergesthat companies' systems have indeed been hacked because of it, this could open a legal can ofworms. Firms could argue that they ought not to be punished for using widely trusted securitysoftware. But aggrieved customers—and their lawyers—may see things differently.

  也許,“心血”漏洞可能造成的風(fēng)險(xiǎn)被夸大了。但是一旦真的有公司因此漏洞被黑客入侵了,就可能引起極為棘手的法律糾紛。企業(yè)可能會(huì)自辯說(shuō)其不應(yīng)該因使用被廣泛信任的安全軟件受罰。但受害的用戶(hù)和他們的律師可不會(huì)這么想。

  Quite how the bug got into the OpenSSL software in the first place is a mystery. BruceSchneier, an internet-security expert, argues in a blog post that “the probability is close toone” that intelligence agencies have exploited the glitch to nab the encryption keys needed todecipher information about their targets. His guess is that the glitch is the result of a codingerror rather than the handiwork of spies, though he says he cannot be sure.

  至于究竟這個(gè)漏洞最初是如何出現(xiàn)在OpenSSL中的,這還是一個(gè)謎。網(wǎng)絡(luò)安全專(zhuān)家布魯斯·施奈爾在他的一篇博客里稱(chēng),“毫無(wú)疑問(wèn)”,情報(bào)部門(mén)已利用此漏洞盜取密鑰以獲取其監(jiān)控目標(biāo)的信息。雖然他不能完全肯定,但他認(rèn)為漏洞是編程失誤的結(jié)果,不太可能是間諜的杰作。

  No matter who is to blame, this episode is another reminder of the security challengescompanies face as ever more economic activity shifts online. According to eMarketer, a researchoutfit, worldwide business-to-consumer e-commerce sales are likely to grow by just over afifth this year, to class="main">

關(guān)于安全的英語(yǔ)美文帶翻譯

時(shí)間: 韋彥867 分享

  不管幕后黑手到底是誰(shuí),這個(gè)事件再一次提醒我們,在企業(yè)不斷將經(jīng)濟(jì)活動(dòng)向線(xiàn)上轉(zhuǎn)移的過(guò)程中,它們將面臨大量的安全挑戰(zhàn)。據(jù)一個(gè)名為eMarketer的市場(chǎng)調(diào)查公司稱(chēng),今年全球B2C電商的銷(xiāo)售總額將有望達(dá)到1.5萬(wàn)億美元,同比增長(zhǎng)超過(guò)五分之一。這是巨大的商機(jī),同時(shí)也會(huì)讓網(wǎng)絡(luò)罪犯?jìng)兏鼒?jiān)定地咬住企業(yè)這塊肥肉。就讓董事會(huì)的老爺們?yōu)榇藷母C火吧。

  關(guān)于安全的英語(yǔ)美文篇3

  Cyber-security

  網(wǎng)絡(luò)安全

  The internet of things (to be hacked)

  (或?qū)⒃庥龊诳偷?物聯(lián)網(wǎng)

  Hooking up gadgets to the web promises huge. But security must not be an afterthought

  將各種東西交聯(lián)到互聯(lián)網(wǎng)上似乎前景極大,但首先應(yīng)該考慮到安全問(wèn)題。

  CYBER-SECURITY is now part of all our lives. “Patches” and other security updates arrive forphones, tablets and PCs. Consultants remind us all not to open unknown files or plugunfamiliar memory sticks into our computers. The bosses of some Western firms throw awayphones and laptops after they have been to China assuming they have been hacked. And yet,as our special report this week points out, digital walls keep on being breached. Last year morethan 800m digital records, such as credit- and debit-card details, were pinched or lost, morethan three times as many as in 2012. According to a recent estimate by the Centre for Strategicand International Studies, a think-tank, the cost to the global economy of cybercrime andonline industrial espionage stands at 445 billion a year—about as much as the GDP of Austria.

  如今,網(wǎng)路安全與我們每個(gè)人息息相關(guān)。手機(jī)、平板電腦以及個(gè)人電腦上的各種“補(bǔ)丁”以及其他的安全更新應(yīng)運(yùn)而生。安全顧問(wèn)提醒我們不要打開(kāi)未知文件或?qū)⒛吧挠洃洶暨B接到自己的電腦上。一些西方公司的老板如果在中國(guó)遭遇黑客,他們就會(huì)將手機(jī)跟筆記本電腦扔掉。正如本周的特別報(bào)道中指出的,數(shù)字墻正遭受著源源不斷的攻擊。去年,諸如信用卡和借記卡記錄在內(nèi)的超過(guò)800m的數(shù)字文件被刪除或丟失,是2012年的三倍之多。據(jù)戰(zhàn)略和國(guó)家問(wèn)題研究中心—一個(gè)智庫(kù)—最新評(píng)估稱(chēng),全球經(jīng)濟(jì)網(wǎng)絡(luò)犯罪和網(wǎng)絡(luò)工業(yè)間諜活動(dòng)一年耗資為4450億美元,將近奧地利的GDP。

  Now a new phase in this contest is emerging: “the internet of things”. This involvesembedding miniature computers in objects and connecting them to the internet using wirelesstechnology. Cisco, a technology company, predicts that 50 billion connected devices will be incirculation by the end of the decade, up from 11 billion last year. Web-connected cars andsmart appliances in homes are becoming more common, as are medical devices that can bemonitored by doctors many miles from their patients. Tech companies are splurging cash:witness Google's punt on driverless cars and the 3.2 billion it has spent buying Nest, a makerof smart thermostats.

  如今,這場(chǎng)對(duì)抗的新階段正在形成——即物聯(lián)網(wǎng)。包括將微型計(jì)算器嵌入物體中并利用無(wú)線(xiàn)技術(shù)將他們連入互聯(lián)網(wǎng)。思科技術(shù)公司預(yù)測(cè),在去年110億的基礎(chǔ)上,2020年底以前將有500億連接裝置處于流通。聯(lián)網(wǎng)汽車(chē)和智能家電以及能供醫(yī)生遠(yuǎn)距離監(jiān)控病人的醫(yī)療裝置越來(lái)越普遍??萍脊境饩拶Y于此,例如谷歌投資無(wú)人駕駛汽車(chē)并花費(fèi)32億美元收購(gòu)智能恒溫器公司Nest。

  Such connectivity offers many advantages, from being able to adjust your house's heatingwhen you are in the office to alerting your doctor that your insulin level has risen. But it alsogives malicious hackers an easy way to burrow deeper into people's lives. The small,embedded computers at the centre of the internet of things do not have as much processingpower or memory as, say, a smartphone, so security software on them tends to berudimentary. There have already been instances of nefarious types taking control ofwebcams, televisions and even a fridge, which was roped into a network of computers pumpingout e-mail spam. And security researchers have found ways of hacking into some kinds ofmedical devices and cars, though this still requires specialist knowledge and kit. The wirelessheart monitor of Dick Cheney, America's former vice-president, was modified to stop remoteassassination attempts.

  這樣連通性提供了許多好處,例如當(dāng)你在辦公室就能夠調(diào)節(jié)房子的供暖設(shè)備,又或是在你的胰島素水平上升時(shí)提醒醫(yī)生。但同時(shí)它也使得惡意黑客們很容易就深入挖掘到人們的生活。物聯(lián)網(wǎng)中心的小型嵌入式計(jì)算機(jī)沒(méi)有像只能手機(jī)那樣的多處理能力或內(nèi)存,所以往往需要安全軟件。已經(jīng)有通過(guò)網(wǎng)絡(luò)群發(fā)垃圾郵件控制攝像頭、電視甚至冰箱的例子。盡管需要專(zhuān)業(yè)的知識(shí)和裝備,安全研究人員仍發(fā)現(xiàn)一些侵入某些醫(yī)療設(shè)備和汽車(chē)的方法。美國(guó)前副總統(tǒng)迪克·切尼的無(wú)線(xiàn)心臟監(jiān)視器就是通過(guò)修改來(lái)停止遠(yuǎn)程暗殺的。

  Beware the fridge in Ealing

  當(dāng)心伊林的冰箱

  For the companies building the internet of things, its vulnerability could be costly. The tacticof pumping out new software as fast as possible and then issuing patches later to fix flaws inthe code may be tolerable if all that is lost is data, but if it involves personal safety, consumerswill be less tolerant. In order to avoid lurid headlines about cars crashing, insulin overdosesand houses burning, tech firms will surely have to embrace higher standards. Just as withcomputers and phones, there will be more passwords and more updates, though that maymake the internet of things less easy to use—a blow for a business based on making life moreconvenient.

  對(duì)于構(gòu)建物聯(lián)網(wǎng)的公司而言,計(jì)算機(jī)的漏洞可能會(huì)使其付出巨大代價(jià)。如果只是丟失了數(shù)據(jù),盡快推出新的軟件然后發(fā)布補(bǔ)丁修復(fù)代碼中的缺陷這一策略是可以被接受,但如果涉及到人身安全,消費(fèi)者將不會(huì)那么寬容了。為了避免關(guān)于撞車(chē)、胰島素過(guò)量以及房屋失火等聳人聽(tīng)聞的標(biāo)題,科技公司必將執(zhí)行更高的標(biāo)準(zhǔn)。就像電腦和電話(huà),物聯(lián)網(wǎng)將會(huì)需要更多的密碼和更新,盡管使用上不再方便,但這是為了使生活有更多的便利。

  For governments, the temptation will be to panic and do too much. They should make clearthat web-connected gadgets are covered by existing safety laws and existing product-liabilityregimes: last year Japan's Toyota was successfully sued for installing malfunctioning, but notweb-connected, software. Wrongdoers should be punished, but the best prompt for securingthe internet of things is competition. Either tech firms will find ways to make web-connectedgadgets more dependable, or people will decide they can live without them. Who needs asmart fridge anyway?

  對(duì)于政府來(lái)說(shuō),這種誘惑是危與機(jī)并存的。他們理應(yīng)明確上網(wǎng)設(shè)備是由現(xiàn)有的安全法律、現(xiàn)有的產(chǎn)品責(zé)任制度所涵蓋。去年日本豐田成功起訴了安裝故障而不是網(wǎng)絡(luò)連接或軟件。違法者應(yīng)該受到懲罰,但保障物聯(lián)網(wǎng)的最好方式是競(jìng)爭(zhēng)。是科技公司設(shè)法使上網(wǎng)設(shè)備更可靠,還是人們決定他們生活中是否應(yīng)該依賴(lài)于此?到底是誰(shuí)需要一個(gè)智能冰箱呢?

  
看了“關(guān)于安全的英語(yǔ)美文”的人還看了:

1.有關(guān)于安全的英語(yǔ)美文

2.關(guān)于安全的英語(yǔ)美文欣賞

3.關(guān)于安全方面的英語(yǔ)美文

4.關(guān)于安全的英語(yǔ)美文大全

5.關(guān)于安全的英語(yǔ)小短文欣賞

2560740