时间:2019-01-07 作者:英语课 分类:英语新闻


英语课

   Many Asian organisations are badly defended against cyber-attacks, a year-long investigation 1 by US security company Mandiant indicates.


  根据美国网络安全公司Mandiant一份长达一年的调查显示,许多亚洲企业在抵御黑客网络攻击方面表现很差。
  The median time between a breach 2 and its discovery was 520 days, its says. That is three times the global average.
  这份调查显示,从入侵发生到发现入侵,大多数亚洲企业花费的时间的520天。这一数值是全球平均水平的三倍。
  Asia was also 80% more likely to be targeted by hackers 3 than other parts of the world, the report said. An average of 3.7GB in data had been stolen in each attack, which could be tens of thousands of documents.
  该报告显示,相比于世界其他地区,亚洲被黑客当做目标的几率要高80%。在每次黑客入侵中,亚洲企业平均要损失3.7G的数据,那可能是数以万计的文件。
  调查显示 亚洲企业网络安全状况世界范围内最差
  However, the bulk of the incidents were not made public because the region lacks breach disclosure laws.
  然而,大部分类似事件都没有被公开,因为亚洲地区缺少违反信息披露的法律。
  Grady Summers, the chief technology officer of Mandiant's parent company, FireEye, said the findings were "very concerning".
  Mandiant母公司“火眼”的首席技术主管格雷迪·萨默斯指出,这些发现“令人非常担忧”。
  "We knew responses to cyber-incidents here in Asia often lag those elsewhere, but we didn't know it was by this much," he told the BBC.
  格雷迪在接受BBC采访时表示:“我们知道亚洲地区对网络事件的反应要落后于世界其他地区,但是我们没想到居然会落后这么多。”
  As part of the study, Mandiant hacked 4 into one organisation's network with its permission to see how vulnerable it was.
  作为研究的一部分,Mandiant在一家机构的允许之下入侵了他们的网络,从而展示他们的网络是多么的不堪一击。
  "Within three days we had the keys to the kingdom," Mr Summers said. "If an expert group of hackers can do the same in three days, imagine what can they do in 520 days."
  萨默斯说道:“三天不到我们就掌握了进入网络的钥匙。如果一个专业的黑客团伙可以在三天做到同样的事的话,想想看他们在520天内可以干些什么。”
  The year-long investigation included vulnerability checks on about 22,000 machines across a variety of sectors 5.
  在这份长达一年的调查中,Mandiant公司对不同行业共22000台机器做了漏洞检查。
  Leaving breaches 6 undiscovered or unreported for too long can ultimately compromise a country's economic competitiveness or national security, Mandiant warns.
  Mandiant警告称,如果没有发现入侵或者太长时间不报告的话,最终会损害一个国家的经济竞争力或国家安全。
  Hackers could take over key infrastructure 7 such as power stations, which happened in the Ukraine, and potentially even transport systems in so-called smart cities.
  黑客们可以占领例如发电站一类的关键基础设施(乌克兰曾经发生过这样的事),甚至有可能占领所谓的“智能城市”中的交通系统。
  On a consumer level, personal information can be used for fraudulent purposes. More than 500 million digital identities were stolen or exposed last year, an earlier report by security company Symantec suggests.
  在消费者层面上,个人信息也许会被用作欺诈目的。此前由网络安全公司赛门铁克发布的一份报告显示,去年全球有超过5亿人的数字身份信息被盗或被泄露。

n.调查,调查研究
  • In an investigation,a new fact became known, which told against him.在调查中新发现了一件对他不利的事实。
  • He drew the conclusion by building on his own investigation.他根据自己的调查研究作出结论。
n.违反,不履行;破裂;vt.冲破,攻破
  • We won't have any breach of discipline.我们不允许任何破坏纪律的现象。
  • He was sued for breach of contract.他因不履行合同而被起诉。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
生气
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
n.部门( sector的名词复数 );领域;防御地区;扇形
  • Berlin was divided into four sectors after the war. 战后柏林分成了4 个区。 来自《简明英汉词典》
  • Industry and agriculture are the two important sectors of the national economy. 工业和农业是国民经济的两个重要部门。 来自《现代汉英综合大词典》
破坏( breach的名词复数 ); 破裂; 缺口; 违背
  • He imposed heavy penalties for breaches of oath or pledges. 他对违反誓言和保证的行为给予严厉的惩罚。
  • This renders all breaches of morality before marriage very uncommon. 这样一来,婚前败坏道德的事就少见了。
n.下部构造,下部组织,基础结构,基础设施
  • We should step up the development of infrastructure for research.加强科学基础设施建设。
  • We should strengthen cultural infrastructure and boost various types of popular culture.加强文化基础设施建设,发展各类群众文化。
标签: 网络安全
学英语单词
air-bag support
Akitio
alpha and beta naphthlamine
asgrown crystal
baclofen
Basque language
Bayel
cast preform
catodic etching
causticized ash
cavitands
clanship
Clematis mandshurica
consubstantialism
Contraction Risk
Cryptophagidae
denver-baseds
dissolved oxygen analyzer for seawater
divestable
doal
Duqi Wan
Dzhuglymskiy Khrebet
El Potrero de Tenavac
environmental protection agency progress report
epizoids
ethno-cultural
Evart
fang chih ku wu
fantin-latour
field emission cathode
flared trousers
FM radio
glycidyl amine resin
half wave voltage doubler
heat radiation pyrometer
herringbone work
hetero-ovular twins
hot laboratory
hyper aggressive
Id al-Adha
immobilize waste
in case that
in the dark
inter-row weeder
International Federation for European Law
kewer
kidney worm
kinoshitalite
konares
laboratory size extruder
manufacturing information control system
medullary trigeminal tractotomy
micro-movement control system
money-lender
multilayeredness
muzorewas
neckars
onware
out-milling
outdoor training
Outfolding
Parafrenal
passive testing
photomosaic
phyllosticta amorphophalli
Physalis alkekengi L. var. franchetii Makino
pigeon's milk
polygraphy
Potentilla anserina
pseudotype
publish the banns
purge cock
Qatari
repsols
restrictionism
say what
SCOPELOSAURIDAE
sea bat
semi-portal bridge crane
short sellers
Sirault
slum area
spastic vasoconstrictive crisis
speed of rolls
split-ticket
st. sebastian c.
straley
supply train
the weft
tickle a person pink
Tondibi
tractus tegmentalis centralis
triazolobenzodiazepine
Uam-ri
ultimate bearing moment
unstathelfast
uranianism
Venetlin
vladimirov
Warhol
wet tissue
wrap around type solar cell