单词 | 窃据 | ||||||||||||||||||||||||||||||||||||||||||||||||
释义 | 窃据 —usurpless common: claim unjustly • expropriate 窃窃 —privatelyunobtrusivelySee also:窃—secretly • (humble) I
|
越来越多的攻击和违规都与有组织的犯罪有关,同时,黑客现在有明确的经济诱惑而 盗 窃 敏 感 数 据。 novell.com | More attacks and breaches have been linked to organized crime, and hackers now have a clear [...] economic incentive to steal sensitive data. novell.com |
关于身分盗窃和数据保护问题,Spies 女士指出,荷兰目前正在草拟一项有 关数据泄露通知的立法提案。 daccess-ods.un.org | In relation to identity theft and data protection, Ms. [...] Spies stated that the Netherlands was currently working on a legislative [...]proposal on data breach notification. daccess-ods.un.org |
(h) 牙买加可根据《拦截通信法》窃听电 话通话,并 根 据 反 洗钱机制改进调 查工具,从而提高了在起诉犯有恐怖主义罪行的人员时收集证据的能力。 daccess-ods.un.org | (h) Through the [...] ability to wiretap telephone calls under the Interception of Communications Act, and the improvement of investigative tools under its Anti-Money [...]Laundering regime, Jamaica [...]has improved its ability to gather evidence in its pursuit to prosecute those responsible for terrorist offences. daccess-ods.un.org |
该提案将要求负责个人资料的人在遇到个人数据 “泄露”而出现涉及隐私的特定风险、包括身分 盗 窃 时 通知 数 据 保 护 当局。 daccess-ods.un.org | The proposal would require those responsible for personal data to notify the data [...] protection authorities in case of [...] “leakage” of personal data with specific risks for privacy, including identity theft. daccess-ods.un.org |
僵尸使犯罪分子能够远程控制你的计算机,以在你不知情的情况下执行非法活动, 如 窃 取 数 据 、 散布垃圾邮件、分发恶意软件以及参与拒绝服务(DOS)攻击等。 checkpoint.com.cn | Bots allow criminals to remotely control [...] your computer to execute illegal [...] activities such as stealing data, spreading spam, [...]distributing malware and participate in [...]Denial of Service (DOS) attacks without your knowledge. checkpoint.com |
随着技术的快速发展,电子数据盗窃 的 现象也越来越普遍。 acs.com.hk | Along with the rapid growth of technology comes the increasing [...] prevalence of electronic data theft. acs.com.hk |
该研究报告使用世界各地 15 [...] 个国家由警方提供的关于三种犯罪(杀人、入 室盗窃和盗窃车辆)的数据认定 ,在经济因素发生重大变化的 11 个国家中的 8 [...] 个国家,有证据显示,在经济危机期间和没有发生经济危机期间,经济因素与 犯罪之间均有联系。 daccess-ods.un.org | Using police-recorded data on three crimes [...] (homicide, burglary and car theft) from 15 countries throughout [...]the world, the study found [...]that in 8 of the 11 countries in which there were substantial changes in economic factors, there was evidence of a relationship between economic factors and crime, both during and outside periods of economic crisis. daccess-ods.un.org |
在2010年业绩的基础上,矩阵预测,如宙斯的 数 据窃 取 木 马,易于部署的Web漏洞,钱骡将继续在2011年患病率上升。 technologeeko.com | Based on performance in 2010, the matrix [...] predicts that the data-theft Trojans such as [...]Zeus, easy-to-deploy Web exploits, and [...]money mules will continue to rise in prevalence in 2011. technologeeko.com |
既然是公共 空间,各国就必须促进网络空间的安全,特别是针对犯罪和恶意活动的安全性, 保护那些选择使用真实性工具的人免遭身份 盗 窃 , 确保 数 据 和 网络的完整性和保 密性。 daccess-ods.un.org | Being a public space, States have to promote security in cyberspace, particularly regarding security against crime and malicious activities, by protecting those who [...] choose to use authenticity tools [...] against identity theft and securing the integrity and confidentiality of data and networks. daccess-ods.un.org |
2008 年 11 月在和平港据称发生的盗窃与贩 毒有关款项的事件,可能牵涉 到海地警察和司法人员,这突出表明了贩毒活动潜在规模及其严重的影响。 daccess-ods.un.org | The potential scale and destructive impact of such activity was [...] highlighted by an alleged theft of money linked to drug [...]trafficking that took place in Port-de-Paix [...]in November 2008, which appeared to implicate members of the Haitian police and judiciary. daccess-ods.un.org |
非授权访问数据类攻击 非授权访问数据攻击的主要目的在于获取网络端单元之间传输的用户数据和 / 信令数据,具体方法有如下几种: 窃听用户数据――获取用户通信内容 窃听信令数据――获取安全管理数据和其他有利于主动攻击的信息 假冒通信接收方――获取用户数据、信令数据和其他有利于主动攻击的信息 [...] 被动传输流分析――获取访问信息 非法访问系统存储的数据――获取系统中存储的数据如合法用户的认证参数等 cltsz.com | Unauthorized access to the data type of attack an attacker unauthorized access to data for the main purpose of the network terminal unit is [...] transmitted between the user data and / signaling data, there are several specific ways: tapping the [...] user data - the contents of intercepted communications for the user signaling data - access to safe management of data and other information [...]conducive [...]to active attacks fake communications receiver - for user data, signaling data, and other pro-active attack the passive transmission of information flow analysis - illegal access to the system for access to information stored data - the data acquisition system stored in the user authentication parameters, such as legal and other cltsz.com |
根据身份盗窃资源 中心(Identity Theft Resource Centre)的一项报告指出,在2008年首11个月份共有34,028,410*个人记录被暴露。 systematic.edu.my | According to a report by Identity Theft Resource Centre, [...] a total of 34, 028, 410 personal records* were exposed for the first 11 months of 2008. systematic.edu.my |
公告还禁 止盗窃、掠 夺、挪用文化财产及故意破坏艺术 的行为和报复行为。 unesdoc.unesco.org | The Bulletin [...] also prohibits theft, pillage, misappropriation, [...]any act of vandalism and reprisals directed against cultural property. unesdoc.unesco.org |
据Choo所说,根据身份盗窃资源 中心的报道,在2010年间共有超过16万人次的个人记录遭受恶意泄露。 systematic.edu.my | According to Choo, the Identity Theft Resource Center [...] reported the exposure of more than 16 million personal records in 2010. systematic.edu.my |
根据巴拿 马刑法规定,凡接收、储存、交易、转换或转让资金、证券、财产 或其他财政资源,且明知它们源自与贩毒、诈骗、非法武器贩运、贩运人口、 绑架、勒索、贪污、腐蚀公职人员、恐怖主义行为、 盗 窃 或 国际贩运车辆有 关的活动,而且其目的是隐藏或掩盖其非法来源或协助逃避此种犯罪的法律 后果的,应处以 5 至 12 年监禁和 100 至 200 天的罚款。 daccess-ods.un.org | Anyone who [...] receives, deposits, trades in, converts or transfers money, securities, property or other financial resources in the knowledge that they are derived from activities related to drug trafficking, fraud, illicit arms trafficking, trafficking in persons, kidnapping, extortion, embezzlement, corruption of public servants, terrorist acts, theft or international [...]trafficking in vehicles, [...]as provided for under Panamanian criminal law, with the aim of hiding or concealing their illicit origin or of helping to evade the legal consequences of such crimes shall be sentenced to 5 to 12 years’ imprisonment and a fine of 100 to 200 days. daccess-ods.un.org |
尽管有些专家认为80亿美元这个数字不太准确,但是不可否认,RFID标签可以帮助零售业解决两大难题:一是商品断货和二是商品损耗(因盗窃和供应链被搅乱而损失的商品) , 据 统 计 只是 盗 窃 这 一项,沃尔玛超市一年的损失就差不多有20亿美元,如果一家合法企业的营业额能达到这个数字,就可以在美国1000家最大企业的排行榜中名列第694位。 klpcc.com | Although some experts believe that $ 8 billion figure is not accurate, but undeniable, RFID tags can help solve two problems Retail: One of goods out of stock and the [...] second is product loss (due to theft and supply chain to be disturbed and the [...] loss of goods ), according to statistics just steal this one, the [...]loss of the year Wal-Mart [...]almost 20 billion U.S. dollars, if a legitimate business turnover to achieve this figure, the largest in the United States 1000 in the name list of enterprises ranked 694. klpcc.com |
在包括图书、出版、音乐、电影、多媒体行业和设计在内的不同文化产 业中,正在阿尔及利亚、阿根廷、中美洲各国、中国、古巴、哥伦比亚、牙买加、立陶宛、 黎巴嫩、秘鲁、塞内加尔、俄罗斯联邦、美国、津巴布韦开展防止 剽 窃 的 活 动。 unesdoc.unesco.org | In the various cultural industries including books, publishing, music, cinema, multimedia crafts and design, as well as actions to prevent piracy, they are being developed in Algeria, Argentina, Central American Countries, China, Cuba, Colombia, Jamaica, Lithuania, Lebanon, Peru, Senegal, Russian Federation, United States and Zimbabwe. unesdoc.unesco.org |
此外,还在搜集和交流 有关信息,以确定那些犯下盗窃、绑 架、勒索以及贩运人口、武器和毒品等罪行 [...] 的犯罪帮派或组织出现的原因及其影响,以及他们的结构和活动情况。 daccess-ods.un.org | Furthermore, information was being gathered and exchanged to establish the causes and effects of the [...] emergence of criminal gangs or organizations [...] engaged in vehicle theft, kidnapping, extortion [...]and trafficking in people, weapons [...]and drugs, and to establish their structure and operations. daccess-ods.un.org |
确保埃及遵守国际义务,包括防止非法或未经授权获取核材料的义务, [...] 以及防止干预合法使用此类材料的义务,此类材料包括 盗 窃 、 虚 报、威 胁、破坏和非法贩运等刑事犯罪活动所涉及的核材料和设施;确保安全 [...] 处理所有领域中各类电离辐射源,以便保证对个人、社会和环境的保护, [...]并确保在核或放射材料、器具、设备和技术方面不开展任何活动,但监 管当局授权的除外。 daccess-ods.un.org | To ensure compliance with Egypt’s international obligations, including the obligation to prevent the illegal or unauthorized acquisition of nuclear material; prevent interference with authorized uses of nuclear [...] material and facilities arising from criminal [...] activities such as theft, misrepresentation, [...]threats, sabotage and illicit trafficking; [...]and ensure the safe handling of sources of ionizing radiation of all types in all fields so as to guarantee the protection of individuals, society and the environment and to ensure that no activity is undertaken in connection with nuclear or radiation material, equipment and technologies, except as authorized by the regulatory authority. daccess-ods.un.org |
在访问期间,工作组发现,非洲人后裔在葡萄牙面临的挑战主要涉及他们 [...] 作为一个特定群体在葡萄牙国家政策和立法框架中得不到承认;其在历史上对 [...] 该国的建设和发展作出积极贡献得不到承认;没有按种族或族裔分列的定性和 定量的分类数据;贫 困、获得教育、公共服务和就业机会不平等,以及在行政 [...] 和司法制度运作方面的歧视,形成恶性循环;存在种族貌相和警察暴力;在政 [...] 治和体制决策进程中代表不足,以及葡萄牙缺少针对非洲人后裔或其他少数群 体的具体措施或扶持行动政策。 daccess-ods.un.org | During their visit, the Working Group found that the challenges faced by people of African descent in Portugal related mainly to their lack of recognition as a specific group in the national policy and legal framework; the lack of recognition of their positive contribution throughout history to the construction and development of the [...] country; the lack of qualitative and quantitative [...] disaggregated data by racial or [...]ethnic origin; the existence of a circle of [...]poverty, unequal access to education, public services, employment, as well as discrimination in the administration and functioning of the justice system; existence of racial profiling and police violence; underrepresentation in political and institutional decision-making processes, as well as the lack of special measures or affirmative action policies in Portugal for people of African descent or other minorities. daccess-ods.un.org |
优质教育的下列方面受到了重视:支持课程体系的审查 和修订,特别是根据各国 的优先工作和阿拉伯世界的需求纳入价值观教育和伦理教育;“以 [...] 学习者为中心”的教育;改进教学工作,包括能力培养和教师培训;提高教师地位;制定标 准进行评估;制订关于优质教育的国家标准。 unesdoc.unesco.org | The following elements of quality education were highlighted: focus on assistance in curricula review and revision, particularly the [...] introduction of values education and ethical [...] approaches, in accordance with national [...]priorities and Arab needs; “learner-centred” [...]education; improvement of teaching including capacity-building and teacher training; improvement in the status of teachers; development of benchmarking and assessment; elaboration of national standards regarding quality education. unesdoc.unesco.org |
此外,如上文第 2 段所述,根据大会第 63/266 号 决议,秘书长已在他的报告中列入 2010-2011 两年期特别政治任务预算 总额的预测数据,他 估计可能高达约 1 148 739 700 美元,比 2010-2011 两年期拟议方案预算中的特别政治任务经费多出 319 811 300 美元(见 A/64/349,第 78 段和附件三)。 daccess-ods.un.org | Furthermore, as noted in [...] paragraph 2 above, pursuant to General Assembly resolution 63/266, the Secretary-General has included in his report a projection of the total budget for special political missions for the biennium 2010–2011, which he estimates [...]could amount to some [...]$1,148,739,700, or $319,811,300 more than the provision for special political missions in the proposed programme budget for the biennium 2010–2011 (see A/64/349, para. 78 and annex III). daccess-ods.un.org |
咨询委员会获悉,任职者将负责与包 [...] 括以下各方的各办公室和实体进行协调和联络:信息和通信技术厅,以解决与系 统托管有关的问题;供应商,涉及技术事项和设备升级;安全和安保部,涉及周 边安全进出管制;“团结”项目工作队,涉及人力资源 数 据 和 资 产管理;国际刑 事警察组织(国际刑警组织),涉及丢失或被盗的旅行证件 数 据 库 ; 以及国际民用 航空组织。 daccess-ods.un.org | The Advisory Committee was informed that the incumbent would be responsible for coordinating and liaising with various offices and entities, including with the Office of Information and Communications Technology to address issues related to the hosting of the system; the vendor in relation to the technical matters and upgrading of equipment; the Department of Safety and Security for perimeter security access control; the [...] Umoja project team for [...] human resources data and asset management; the International Criminal Police Organization (INTERPOL) for a lost or stolen travel document database; and [...]the International Civil Aviation Organization. daccess-ods.un.org |
会议提出了许多其它建议,诸如确保数字遗产得到保护,包括把档案和图书馆作为 [...] “世界记忆计划”的组成部分;制订儿童和成人媒体教育计划; 根 据 信 息 社会世界首脑会议 的精神,特别在知识社会和知识经济的背景下,推广普及使用信息传播技术。 unesdoc.unesco.org | A range of other suggestions was put forward, such as: to ensure the preservation of digital heritage, including archives and libraries as a component of the “Memory of the World Programme”; to develop media education programmes for [...] children and adults; and to increase [...] familiarity with the use of ICTs, especially [...]within the framework of the knowledge society [...]and knowledge economy, in light of the outcomes of the World Summit on the Information Society. unesdoc.unesco.org |
英汉双解词典包含2273206条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。