1. 高分啊~!急! 关于网络安全的英文翻译
分类: 教育/科学 >> 外语学习
问题描述:
由于文章的这段过于专业 希望懂的兄弟们帮帮忙~~翻译一下~
The International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model defines seven layers of munications types, and the interfaces among them. (See Figure 1.) Each layer depends on the services provided by the layer below it, all the way down to the physical neork hardware, such as the puter's neork interface card, and the wires that connect the cards together.
An easy way to look at this is to pare this model with something we use daily: the telephone. In order for you and I to talk when we're out of earshot, we need a device like a telephone. (In the ISO/OSI model, this is at the application layer.) The telephones, of course, are useless unless they have the ability to translate the sound into electronic pulses that can be transferred over wire and back again. (These functions are provided in layers below the application layer.) Finally, we get down to the physical connection: both must be plugged into an outlet that is connected to a switch that's part of the telephone system's neork of switches.
If I place a call to you, I pick up the receiver, and dial your number. This number specifies which central office to which to send my request, and then which phone from that central office to ring. Once you answer the phone, we begin talking, and our session has begun. Conceptually, puter neorks function exactly the same way.
It isn't important for you to memorize the ISO/OSI Reference Model's layers; but it's useful to know that they exist, and that each layer cannot work without the services provided by the layer below it.
What are some Popular Neorks?
Over the last 25 years or so, a number of neorks and neork protocols have been defined and used. We're going to look at o of these neorks, both of which are ``public'' neorks. Anyone can connect to either of these neorks, or they can use types of neorks to connect their own hosts (puters) together, without connecting to the public neorks. Each type takes a very different approach to providing neork services.
UUCP
UUCP (Unix-to-Unix CoPy) was originally developed to connect Unix (surprise!) hosts together. UUCP has since been ported to many different architectures, including PCs, Macs, Amigas, Apple IIs, VMS hosts, everything else you can name, and even some things you can't. Additionally, a number of systems have been developed around the same principles as UUCP.
解析:
国际标准化组织(简写为ISO)开放互连系统(简写为OSI)访问模型定义了七个层次的通信类型和它们之间的
接口(见图1). 每一层取决于它下面一层所提供的服务,一直延伸到物理网络硬件,如计算机的网卡、以及
把这些卡连接在一起的线路.
简单地看这个模型的方法是把它和我们日常使用的东西:电话作比较.为了让你和我在听力所及范围之外交
谈,我们需要一个类似电话的装置.(在ISO/OSI模型,这位于应用层). 电话,只有在它们能把声音转换成电
子脉冲听通过线路来回传送时才有用.(这种功能是由应用层以下提供). 最后,我们着手物质的连接:两者
必须嵌入一个出口,它连接到电话系统的网络交换机中的一个转换器.
如果我给你打电话,我拿起接收器、拨你的号码.这个号码指定了哪个中央交换器来发送我的请求,然后,那
个中央转换器拨通哪个电话.一旦你接电话,我们开始交谈,我们的对话已经开始.从概念上说,计算机网络
的功能跟这一模一样.
你没有必要背诵ISO/OSI访问模型的层次;但知道它们的存在并且没有下面一层提供的服务每一层将无法工
作是有用的.
什么是一些热门的网络?
过去25多年来,一批网络和网络协议已被确定和使用.要去看看其中的两个网络,两者都是公共网络.任何人
都可以连接到这两个网络之一,或者他们可以使用各种网络类型把连接自己的主机(计算机)连接到一起,
而无需连接到公共网络.每种类型采取很不相同的方式提供网络服务.
uucp
uucp(UNIX系统至UNIX系统的复制)原是为连接UNIX系统主机研制(惊讶!).uucp从此被转化成很多不同的体
系结构,包括个人电脑、互助、amigas,苹果,视频调制系统等一切你能命名的和甚至有些你不能命名的.此
外,一些系统已经开发了类似于uucp的原理的.
2. 关于网络安全英语短句
safe 英[seɪf] 美[sef]
adj. 安全的; 保险的,肯定的; 无损的; 提供保护的;
n. 保险箱,保险柜; 冷藏箱; 〈俚〉避孕套;
[例句]Officials arrived to assess whether it is safe to bring emergency food supplies into the city
官员们赶来评估向该市调拨紧急救援食品是否安全。
[其他] 比较级:safer 最高级:safest 复数:safes
The computer is one kind of tool, is uses to us, but not plays; The academic society uses the human is a smart person, will only play the human will be the stupid person, you may access the net, to look that the news, the understanding current event, will simultaneously raise itself to study using the network, but plays the game purely, is obtained the more network knowledge oneself. Although the network is a messenger, is also the good teacher and helpful friend who studies, but excessively many surfers can cause the vision to drop, the academic record drops; Serious also has the possibility to create is with one's family broken up and decimated!
电脑是一种工具,是给我们用的,而不是玩的;学会用的人是聪明人,只会玩的人则是愚蠢的人,你可以上网,看新闻、了解时事,同时培养自己利用网络来学习,而不是单纯地玩游戏,让自己获得更多的网络知识。网络虽是一个通信员,也是学习上的良师益友,但过多的上网会导致视力下降,学习成绩下降;严重的还有可能造成家破人亡!
Recently, the news that U.S attack on China's Internet is always exposed. And the question of how to stay online safely raises a lot of discussion in our country. As a result, in the era of rapid development of network, we must take measures to protect our security of privacy and property effectively.
最近的新闻都揭示了美国对中国网络的攻击。如何安全地上网在我国引起了大量的讨论。结果是在网络飞速发展的时代,我们必须要采取有效的措施来保护我们的隐私和财产安全。
From my perspective, in the first place, we should call attention to our personal information. Not only do we not offer them at random in some strange websites, but we need to distinguish right from wrong among the numerous websites. Furthermore, it is inevitable that some secure anti-virus soft wares can be installed. And it will make it possible for that network can run more steadily. In addition to doing some work by ourselves, the government needs to draw up some policies to preserve national cyber security. It involves probing for deeply rooted reasons, devising creative solutions, developing high-tech talents and strengthening the supervision.
从我的角度来看,首先,我们应该关注我们的个人信息。我们不仅不随随便便在一些奇怪的网站提供自己的信息,而且我们需要在众多的网站之间明辨是非。此外,安装一些安全的杀毒软件是必须的。这使得网络运行更加稳定。除了我们自己该做一些努力之外,还需要政府制定相关政策来保护国家网络安全。这就涉及到探究深层次的原因,想出有创造性的解决方案,发展高新技术人才、加强监管。
Although scientists still cannot overcome the problem completely, they are studying a great deal about how to protect our national cyber security. However, consciousness of cyber security should not decline. Only in this way, we just enjoy the convenience brought by the network.
尽管科学家仍无法完全克服这个问题,但是他们正在研究大量关于如何保护我们国家网络安全的办法。然而,不应该放松网络安全意识。只有这样我们才能享受到网络带给我们的便利。
Internet can be used for learning knowledge and it's richer than any library 网络可以用来 学习知识 并且它比任何一个图书馆里的知识都要丰富
It is a very valuable research tool 网络是个有价值的搜索工具
Another problem of the internet is the amount of pornography on it 另一个问题是网上有很多不健康信息
It allows Humans all over the world to keep in touch通过网络来自不同的地方的人也可以互相交流
the internet can play its part in informing us about what our own governments are doing通过网络我们可以知道我们的政府正在做什么
What one of your friends tells you might be more reliable than an internet site你的任何一个朋友告诉你的信息有可能比一个网站上的可靠.
internet give people many conveniences互联网给人带来许多便利
you can buy goods which you need without going to a supermarket or any shop ,but only by e-shopping你可以不用去商店或者超市就能直接通过电子购物而买到需要的商品
emails is another benefit the internet brings to us,especially for businessmen 电子邮件则是另一个由因特网带来的好处,特别是对于工作的人
7a6431333337623462Along with the time development, accessing the net already turned the extremely universal matter. No matter is alt or the child, so long as mentioning the computer, all think of internet. But, accessing the internet is advantageous ,but also has shortcoming.
I knew very many people access the net, mainly is for playing games, which is very bad for the study. Therefore, some people believed, the elementary and middle school students lack the self-control.
But,there are many people approving to accessing internet, why? Because internet can provide to the people very helps. First, the network looks like a library, we can look up very many materials easily,and it is quicker than the speed of consulting books; Next, we may read a richer news on-line; In addition, accessing the net also has other functions, for example, E-mail, telephoning on the net and so on.
Actually, accessing the net has its profit and the shortcoming place. We use it to open to expand the field of vision, the study knowledge, but must certainly grasp the discretion.
Strength alone knows conflict, weakneis below even defeat, and is born vanquished. -- Swetchine
只有强者才懂得斗争;弱者甚至失败都不够资格,而是生来就是被征服的。
The people who get on in this world are the people who get up and look for circumstances they want, and if they cannot find them, make them. -- Bernara Shaw
在这个世界上取得成就的人,都努力去寻找他们想要的机会,如果找不到机会,他们便自己创造机会。
Since twentieth Century, the rapid development of computer technology, especially the rapid development of Internet technology, has put the whole world even as a whole, so that the social development is inseparable from the information network. It constantly changing economic, social, cultural structure and operation mode, and the transmission of information relating to financial, science ecation, military and other fields, in to the people and the country brings convenient, efficient information sharing at the same time, but also to the security of network information has brought many problems. In today's international competitive situation, the network information security is more and more attention from all over the world. This article from the network information security problems and characteristics, the main techniques of network security, common network attack methods and countermeasures, the construction of network security and other aspects of the present stage of our country network information security problems and restricting factors and how from technology and management and other aspects the construction has the Chinese characteristic information security comprehensive security system, ensure our country network information security.
Key word
The network information security of network attack network ethics network security comprehensive security system
1. nothinask not what your country can do for you ,ask what you can do for your country.
2. in the world is impossible if you set your mind to do it.
3. never put off till tomorrow what you can do today.
4. He bites off more than he can chew.
5. To teach a fish how to swim.
6. The supreme happiness of life is the conviction that we are loved.
7. Cultured and fine manners are everywhere a passport to regard.
8. What you love on the swings you get back on the roundabouts.
9. No man lives without jostling and being jostled ,in all ways he has to elbow himself through the world giving and receiving offence.
10. Thought is the seed of action.
3. 请教几个英语单词,谢谢,在线等
Network Security 网络安全
safety monitor.安全监控
service provider solution 运营商解决方案
system integration 系统集成
website development 网站开发
4. pust英语翻译
泛指非科技联合会
网络:普斯特;
双语例句:
1.Dont't move back, I don't pipe my eye, either pust because you are in my life.
我不退缩我不流泪,只因为生命中有你。
2.It has become a strategic issue how to pust our national economy onto a new stage.
如何使国民经济发展再上一个新台阶已成为举国上下无不关注的发展战略问题。
3.We must pust this program in pratice what ever we can.
我们无论如何都要推进这项计划。
4.Practices in the pust years show that this accounting system has played an active the role in promoting the development of scientific economy and the reform of scientific system.
但随着我国经济体制改革的不断深化,该制度随之显出自身的局限性,已不能满足建立社会主义市场经济体制下现代科研院所的需要。因此科研单位的会计制度的改革势在必行。
5.The company has 2000 employess in 15 offices in Asia, pust 11 reaserch- and-development centers, where engineers are launching a large of procts and services for Asian markets as well as Internet users world-wide
在谷歌设在亚洲的11个研发中心里,工程师们正面向亚洲市场以及全球网络用户推出大量的产品和服务。
6.We could rece the distinctions between China and the developed countries in order to strengthen our actual strength and to enlarge the development spaces for our existence, only to seize the opportunities, to accept the challenges and to actively pust forward the process of China's informalization.
中国只有抓住机遇,迎接挑战,积极推动信息化进程,才能缩小与发达国家之间的差距,增强自身实力并扩大生存发展空间。
7.WMG Series Pulse Pust Remover is ased for powder separating the gas containing st, It can make the gas parified.
WMG系列脉冲布筒滤尘器用于含尘空气的粉尘分离。使含尘空气经过过滤介质得到净化,以满足现代化环保要求。
5. 请教下网络安全用英文怎么翻译
Network Security
6. 有关网络通信方面的英语词汇
网络:network 网络通信:networking | Network Communications | Internet Communication网络安全:network security, Internet security网络电话:VOIP(Voice of Internet Phone)通信与信息系统:CIS (communication and information system)通信工程:communication engineering通信系统:communication system,
7. 互联网安全术语
36条网络安全术语盘点
网络安全
以下的网络安全常用术语,你都清楚吗?
01肉鸡
被黑客入侵并被长期驻扎的计算机或服务器。
02抓鸡
利用使用量大的程序的漏洞,使用自动化方式获取肉鸡的行为。
03webshell
通过web入侵的一种脚本工具,可以据此对网站服务进行一定程度的控制。
04一句话木马
通过向服务器提交一句简短的代码,配合本地客户端实现webshell功能的木马。
05提权
操作系统低权限的账户将自己提升为管理员权限使用的方法。
06后门
黑客为了对主机进行长期的控制,在机器上种植的一段程序或留下的一个入口。
07跳板
使用肉鸡IP来实施攻击其他目标,以便更好的隐藏自己的身份信息。
08旁站入侵
即同服务器下的网站入侵。
090day 漏洞 和 0day 攻击
0day 漏洞,又称零日漏洞 “zero-day”。是已经被发现 (有可能未被公开),而官方还没有相关补丁的漏洞。 利用0day漏洞的攻击行为即为0day攻击。
10CVE
CVE 的英文全称是 “Common Vulnerabilities & Exposures” 公共漏洞和暴露,例如 CVE-2015-0057、CVE-1999-0001 等等。CVE 就好像是一个字典表,为广泛认同的信息安全漏洞或者已经暴露出来的弱点给出一个公共的名称。
11PoC
你可以理解成为漏洞验证程序。和一些应用程序相比,PoC 是一段不完整的程序,仅仅是为了证明提出者的观点的一段代码。
12Exp
漏洞利用程序。简单讲就是一段可以发挥漏洞价值的程序,可以用过漏洞拿到目标机器的权限。
13SSL
安全套接字层(SSL, Secure Sockets Layer)是一种协议,支持服务通过网络进行通信而不损害安全性。
14APT攻击
高级持续性攻击,也称为定向威胁攻击,指某组织对特定对象展开的持续有效的攻击活动。这种攻击活动具有极强的隐蔽性和针对性,通常会运用受感染的各种介质、供应链和社会工程学等多种手段实施先进的、持久的且有效的威胁和攻击。
15旁注
旁注是一种入侵方法,利用同一主机上面不同网站的漏洞得到webshell,从而利用主机上的程序或者是服务所暴露的用户所在的物理路径进行入侵。
16免杀
就是通过加壳、加密、修改特征码、加花指令等等技术来修改程序,使其逃过杀毒软件的查杀。
17红蓝对抗
网络安全中,红蓝对抗是一方扮演黑客(蓝军),一方扮演防御者(红军),进行网络安全的攻防对抗。
18Payload
Payload即有效载荷,被隐藏并且秘密发送的信息。
19DDOS攻击
分布式拒绝服务攻击(英文意思是Distributed Denial of Service,简称DDoS)是指处于不同位置的多个攻击者同时向一个或数个目标发动攻击,或者一个攻击者控制了位于不同位置的多台机器并利用这些机器对受害者同时实施攻击。由于攻击的发出点是分布在不同地方的,这类攻击称为分布式拒绝服务攻击,其中的攻击者可以有多个。
20IDS
入侵检测系统(IDS是英文“Intrusion Detection Systems”的缩写)。专业上讲就是依照一定的安全策略,通过软、硬件,对网络、系统的运行状况进行监视,尽可能发现各种攻击企图、攻击行为或者攻击结果,以保证网络系统资源的机密性、完整性和可用性。
21IPS
入侵防御系统(IPS),有过滤攻击功能的特种安全设备。一般布于防火墙和外来网络的设备之间,依靠对数据包的检测进行防御(检查入网的数据包,确定数据包的真正用途,然后决定是否允许其进入内网)。
22WAF防护
WAF英文全称为Web Application Firewall,中文含义为网站应用级入侵防御系统,是一项网络安全技术,主要用于加强网站服务器安全。
23MD5算法
信息摘要算法(英语:MD5 Message-Digest Algorithm),一种被广泛使用的密码散列函数,可以产生出一个128位的散列值(hash value),用于确保信息传输完整一致。
24黑盒测试
在未授权的情况下,模拟黑客的攻击方法和思维方式,来评估计算机网络系统可能存在的安全风险。
25白盒测试
白盒测试就偏向于代码审计。
26灰盒测试
基于白盒与黑盒测试之间的一种产物。
27僵尸网络(Botnet)
僵尸网络 Botnet是指采用一种或多种传播手段,将大量主机感染bot程序(僵尸程序)病毒,从而在控制者和被感染主机之间所形成的一个可一对多控制的网络。
28鱼叉攻击
“鱼叉攻击”通常是指利用木马程序作为电子邮件的附件,发送到目标电脑上,诱导受害者去打开附件来感染木马。
29钓鱼式攻击
钓鱼式攻击是一种企图从电子通讯中,通过伪装成信誉卓着的法人媒体以获得如用户名、密码和信用卡明细等个人敏感信息的犯罪诈骗过程。
30水坑攻击
水坑攻击”,黑客攻击方式之一,顾名思义,是在受害者必经之路设置了一个“水坑(陷阱)”。最常见的做法是,黑客分析攻击目标的上网活动规律,寻找攻击目标经常访问的网站的弱点,先将此网站“攻破”并植入攻击代码,一旦攻击目标访问该网站就会“中招”。
31社会工程学攻击
社会工程学(Social Engineering),是一种通过人际交流的方式获得信息的非技术渗透手段。
32TOP500姓名
中国常用姓名前500个,可以设置为攻击字典碰撞用户密码。
33DLL注入
将一个DLL放进某个进程的地址空间里,让它成为那个进程的一部分。
34SQL注入
SQL注入,就是通过把SQL命令插入到Web表单提交或输入域名或页面请求的查询字符串,最终达到欺骗服务器执行恶意的SQL命令。具体来说,它是利用现有应用程序,将(恶意的)SQL命令注入到后台数据库引擎执行的能力,它可以通过在Web表单中输入(恶意)SQL语句得到一个存在安全漏洞的网站上的数据库,而不是按照设计者意图去执行SQL语句。
35sys驱动
驱动程序一般指的是设备驱动程序(Device Driver),是一种可以使计算机和设备通信的特殊程序。相当于硬件的接口,操作系统只有通过这个接口,才能控制硬件设备的工作。
36加壳
对可执行程序进行资源压缩的手段. 另一种形式是在二进制的程序中植入一段代码,在运行的时候优先取得程序的控制权,之后再把控制权交还给原始代码,这样做的目的是隐藏程序真正的OEP(入口点,防止被破解)。大多数病毒就是基于此原理。
如有帮助,敬请采纳,谢谢!
8. 安全的英语单词怎么写
问题一:安全的英文怎么写 safe 形容词,“安全的”
safety 名词,“安全”
问题二:安全英语单词 safety
n.安全;保险;安全设备;保险装置;安打
security
n.安全;保证;证券;抵押品
sureness
n.安全 ,踏实,确实
问题三:保持安全英语单词怎么写 保持安全
[网络] Stay safe; Stay Secure; keep safe;
[例句]不,我喜欢和欢乐保持安全距离!
No, I prefer to keep a safe distance from all this merriment.
问题四:安全的英语单词怎么写 名词safety 形容词safe
问题五:安全的英文 safe; secure; safety; security; anchor-hold ;
问题六:安全的英文怎么写 safe 形容词,“安全的”
safety 名词,“安全”
问题七:保持安全英语单词怎么写 保持安全
[网络] Stay safe; Stay Secure; keep safe;
[例句]不,我喜欢和欢乐保持安全距离!
No, I prefer to keep a safe distance from all this merriment.
问题八:安全的英语单词怎么写 名词safety 形容词safe
问题九:安全英语单词 safety
n.安全;保险;安全设备;保险装置;安打
security
n.安全;保证;证券;抵押品
sureness
n.安全 ,踏实,确实
问题十:平安的英文单词怎么写? 平安:
汉语意思:1. 没有事故,没有危险 2. 指人的心境平静安定 3. 人的名字
英文释义:
1. safty, no danger and accident
2. peaceful and stable mind
3. used in people's name
对应的英语单词: safety n. 平安
safe adj. 平安的
security n. 平安,安全
secure adj. 安全的,无虑的
9. 网络安全英语怎么说
网络安全是指网络系统的硬件、软件及其系统中的数据受到保护,不因偶然的或者恶意的原因而遭受到破坏、更改、泄露,系统连续可靠正常地运行,网络服务不中断。那么你知道网络安全用英语怎么说吗?下面跟着我一起来学习一下吧。
网络安全的英语说法1:
]network security
网络安全的英语说法2:
cyber security
网络安全相关英语表达:
系统网络安全协会 SANS Institute
通信和网络安全 Telecommunications and Network Security
网络安全产品 network safety procts
网络安全的英语例句:
1. At last It'summarizes and expects E - Government network security system.
最后对 电子政务 网络安全进行 总结 和展望.
2. The first chapter summarize the network, networked instruments and network switch.
第一章概述了网络数据的隔离与网络安全,并给出了几大典型应用.
3. Other problems related to intranet security are also discussed.
同时对涉及网络安全的有关问题进行了讨论.
4. A firewall acts like a virtual security guard for your network.
防火墙类似于一个虚拟的网络安全守卫.
5. Rep: " It was a six - page letter on internet security. "
销售人员: “ 是一封关于网络安全的6页长的信. ”
6. An emergency response system is designed and its work mechanism is analyzed.
构建了一个网络安全应急响应系统,并对系统的工作机制进行了分析.
7. Lastly, elementary fulfillment of NSMS also explained this essay.
最后, 本文给出了网络安全监控系统的初步实现.
8. Other activities which harm the network are also prohibited.
(五)其他危害计算机信息网络安全的.
9. Its procts cover anti - virus , network security and hacker protection.
其产品覆盖 反病毒, 网络安全和黑客防卫.
10. The network security includes firewall, intrusion detection and hole scanning etc.
网络安全技术有:防火墙 、 入侵检测和漏洞扫描等.
11. But when we rejoice about it's expediency, the network security come closely.
然而就在人们为之欣喜的同时, 网络安全问题接踵而至.
12. Email filter is a very important subject in network security.
邮件过滤是当前网络安全中比较重要的一个学科.
13. The technique of Sniffer Discovery is a hard problem in network security.
嗅探器发现技术是网络安全中重要问题.
14. Data encryption is one of the key technologies in network security.
数据加密技术是实现网络安全的关键技术之一.
15. Introcing Intranet security resolvent's goal, principia, constitutes and keystone.
提出网络安全设计的目标 、 原则 、 组成部分及侧重点.
10. 跟网络有关的英语单词有哪些
WAN、LAN、B/S、FTP、HTTP等等。
1、WAN(Wide area network,广域网,指地理上跨越较大范围的跨地区网)
2、LAN(Local area network,局域网,地理上局限在小范围,属于一个单位组建的网)
3、B/S(Browser/Server,浏览器/服务器,指客户通过浏览器访问服务器的信息)
4、FTP(File Transfer Protocol,文件传送协议,用此协议用户通过Internet将一台计算机上的文件传送到另一台计算机上)
5、HTTP(Hypertext Transfer Protocol,超文本传输协议 WWW服务程序所用的协议)
(10)英语网络安全词汇扩展阅读:
广域网WAN一般最多只包含OSI参考模型的底下三层,而且大部分广域网都采用存储转发方式进行数据交换,也就是说,广域网是基于报文交换或分组交换技术的(传统的公用电话交换网除外)。
广域网中的交换机先将发送给它的数据包完整接收下来,然后经过路径选择找出一条输出线路,最后交换机将接收到的数据包发送到该线路上去,以此类推,直到将数据包发送到目的结点。
广域网可以提供面向连接和无连接两种服务模式,对应于两种服务模式,广域网有两种组网方式:虚电路( virtual circuit)方式和数据报( data gram)方式,下面我将分别讨论广域网的两种组网方式,并对它们进行比较。
广域网不同于局域网,它的范围更广,超越一个城市、一个国家甚至达到全球互连,因此具有与局域网不同的特点:
1、覆盖范围广通信距离远,可达数千公里以及全球。
2、不同于局域网的一些固定结构,广域网没有固定的拓扑结构,通常使用高速光纤作为传输介质。
3、主要提供面向通信的服务,支持用户使用计算机进行远距离的信息交换。
4、局域网通常作为广域网的终端用户与广域网相连。
5、广域网的管理和维护相对局域网较为困难。
6、广域网一般由电信部门或公司负责组建、管理和维护,并向全社会提供面向通信的有偿服务、流量统计和计费问题。