词汇 | example_english_cybersecurity |
释义 | Examples of cybersecurityThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. Many government officials and cybersecurity experts believe that the private-sector has failed to solve the cybersecurity problem and that regulation is needed. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Research projects include the areas of space science, bioengineering, cybersecurity, nanotechnology, and behavioral and brain sciences. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The bill amended section 13 to say that the powers of interception could also be used for information assurance and cybersecurity. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. He is known for his applied contributions to bioinformatics, cybersecurity, and computational finance. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. There are many advantages to obtaining certification including the ability to get cybersecurity insurance. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. For certain standards, cybersecurity certification by an accredited body can be obtained. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Each year, the month has weekly themes that deal with specific groups and trends in cybersecurity. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. There are many bases for this activity that include infrastructure protection and cybersecurity. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These security breach notification regulations punish firms for their cybersecurity failures while giving them the freedom to choose how to secure their systems. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It aims to reduce vulnerabilities in governmental and private cybersecurity policies by developing consensus proposals for new agreements and policy reform. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The act also specified the development and support of cybersecurity forensic capabilities. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Organizations can use the service for cybersecurity exercises, educational purposes, and software testing. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These guides provide general outlines as well as specific techniques for implementing cybersecurity. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. For cybersecurity, a single cyberattack can degrade a control system in multiple ways. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The purpose of cybersecurity regulation is to force companies and organizations to protect their systems and information from cyber-attacks. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Through a series of top-level roundtables, meetings and debates, the event addressed pressing issues such as climate change, global economic recovery and cybersecurity. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The bill would allow federal intelligence agencies to share cybersecurity intelligence and information with private entities and utilities. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Graduate students can earn a certificate in cybersecurity management. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Granted, popular enterprise technology is nowhere as secure as it should be, but today's federal cybersecurity woes result more from flawed technology management practices than flawed technology. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It does so through a holistic approach that enables federal stakeholders to address cybersecurity challenges in a manner that maximizes value while minimizing risks associated with technology and security investments. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The bill would define cybersecurity mission as threat and vulnerability reduction, deterrence, incident response, resiliency, and recovery activities to foster the security and stability of cyberspace. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。