BIOS口令 |
BIOS kǒu líng |
BIOS (basic
input/output system) password |
IP地址信用评价模型 |
IP dì zhǐ xìn yòng
píng jià mó xíng |
IP address credit
evaluation model |
安情报部门 |
ān qíng bào bù mén |
public security
intelligence department |
安全保护对策 |
ān quán bǎo hù duì cè |
security protection
countermeasure |
安全标准 |
ān quán biāo zhǔn |
safety standard |
安全港 |
ān quán gǎng |
safe harbor |
安全检查 |
ān quán jiǎn chá |
security inspection |
安全联盟战略 |
ān quán lián méng
zhànlüè |
security union
strategy |
安全评估 |
ān quán píng gū |
security assessment |
安全事件特征提取 |
ān quán shì jiàn tè
zhēng tí qǔ |
security event feature
extraction |
安全威胁 |
ān quán wēi xié |
security threat |
安全芯片 |
ān quán xīn piàn |
secure element |
安全云管平台 |
ān quán yún guǎn píng
tái |
secure cloud
management platform |
暗网 |
àn wǎng |
dark web |
白帽子 |
bái mào zǐ |
white hat |
保留格式加密 |
bǎo liú gé shì jiā mì |
format-preserving
encryption |
保密管理 |
bǎo mì guǎn lǐ |
confidentiality
management |
贝叶斯定理 |
bèi yè sī dìng lǐ |
Bayes’ theorem |
边界防护 |
biān jiè fáng hù |
border protection |
边缘存储 |
biān yuán cún chǔ |
edge storage |
标识密码技术 |
biāo shí mì mǎ jì shù |
identification
cryptography; identity-based cryptography |
标准化 |
biāo zhǔn huà |
standardization |
标准体系 |
biāo zhǔn tǐ xì |
standard system;
standard architecture |
不可篡改 |
bù kě cuàn gǎi |
tamper proof |
不同意的情况 |
bù tóng yì de qíng
kuàng |
non-consent scenario |
采信率低 |
cǎi xìn shuài dī |
low acceptance rate |
产品检测 |
chǎn pǐn jiǎn cè |
product testing |
产品制定 |
chǎn pǐn zhì dìng |
product development |
持续集成 |
chí xù jí chéng |
continuous integration |
创新
|
chuàng xīn |
innovation |
次序保留加密 |
cì xù bǎo liú jiā mì |
order-preserving
encryption |
大规模准入运动
|
dà guī mó zhǔn rù yùn
dòng |
mass access campaign |
大国竞争 |
dà guó jìng zhēng |
great power
competition |
大数据 |
dà shù jù |
big data |
大数据分析 |
dà shù jù fēn xī |
big data analysis |
大数据治理 |
dà shù jù zhì lǐ |
big data governance |
单光子探测器 |
dān guāng zǐ tàn cè qì
|
single photon detector |
地缘政治 |
dì yuán zhèng zhì |
geopolitics |
第三方评估认证 |
dì sān fāng píng gū
rèn zhèng |
third-party assessment
and certification |
电磁战 |
diàn cí zhàn |
electromagnetic
warfare |
电子认证 |
diàn zǐ rèn zhèng |
electronic
authentication |
电子商务谈判 |
diàn zǐ shāng wù tán
pàn |
e-commerce negotiation |
电子数据 |
diàn zǐ shù jù |
electronic data |
电子数据证 |
diàn zǐ shù jù zhèng |
digital evidence |
顶层设计 |
dǐng céng shè jì |
top-level design |
动态算力 |
dòng tài suàn lì |
dynamic computing
power |
动态信息系统 |
dòng tài xìn xī xì
tǒng |
dynamic information
system |
动态智能编排 |
dòng tài zhì néng biān
pái |
dynamic intelligent
arrangement |
对称加密 |
duì chēng jiā mì |
symmetric encryption |
多方存证
|
duō fāng cún
zhèng |
multi-party storage |
多方协同 |
duō fāng xié tóng |
multi-party
coordination |
多利益相关方 |
duō lì yì xiāng guān
fāng |
multi-stakeholders |
罚款标准 |
fá kuǎn biāo zhǔn |
penalty standard |
防克隆 |
fáng kè lóng |
anti-cloning |
防御措施 |
fáng yù cuò shī |
defensive measure |
访问控制 |
fǎng wèn kòng zhì |
access control |
分布式标识 |
fēn bù shì biāo shí |
decentralized
identifier |
分布式身份认证 |
fēn bù shì shēn fèn
rèn zhèng |
decentralized identity
authentication |
分布式账本技术 |
fēn bù shì zhàng běn
jì shù |
distributed ledger
technology |
风险 |
fēng xiǎn |
risk |
风险分析 |
fēng xiǎn fēn xī |
risk analysis |
服务治理 |
fú wù zhì lǐ |
service governance |
负面示范 |
fù miàn shì fàn |
negative demonstration |
个人数据保护 |
gè rén shù jù bǎo hù |
personal data
protection; personal information protection |
个人信息流动 |
gè rén xìn xī liú dòng
|
personal information
flow |
个人隐私 |
gè rén yǐn sī |
privacy |
工业互联网 |
gōng yè hù lián wǎng |
industrial internet |
公安情报产品 |
gōng ān qíng bào chǎn
pǐn |
public security
intelligence product |
公私合作 |
gōng sī hé zuò |
public-private
cooperation |
共识机制 |
gòng shí jī zhì |
consensus mechanism |
共享数据交换 |
gòng xiǎng shù jù jiāo
huàn |
shared data exchange |
共享数据使用 |
gòng xiǎng shù jù shǐ
yòng |
shared data usage |
共享数据准备 |
gòng xiǎng shù jù zhǔn
bèi |
shared data
preparation |
关键基础设施保护 |
guān jiàn jī chǔ shè
shī bǎo hù |
critical
infrastructure protection |
关键信息基础设施 |
guān jiàn xìn xī jī
chǔ shè shī |
critical information
infrastructure |
国产操作系统 |
guó chǎn cāo zuò xì
tǒng |
domestic operating
system |
国产计算机 |
guó chǎn jì suàn jī |
domestic computer |
国防网络局 |
guó fáng wǎng luò jú |
defense cyber agency |
国际法 |
guó jì fǎ |
international law |
国际规范 |
guó jì guī fàn |
international norms |
国际合作机制 |
guó jì hé zuò jī zhì |
international
cooperation mechanism |
国际稳定 |
guó jì wěn dìng |
international
stability |
国家安全 |
guó jiā ān quán |
national security |
国家安全战略 |
guó jiā ān quán zhàn
lüè |
national security
strategy |
国家互联网 |
guó jiā hù lián wǎng |
national Internet |
国家网络总监 |
guó jiā wǎng luò zǒng
jiān |
National Cyber
Director (of the United States) |
过程方法 |
guò chéng fāng fǎ |
process method |
航拍图像 |
háng pāi tú xiàng |
aerial imagery |
合法性基础 |
hé fǎ xìng jī chǔ |
legitimate basis |
合规困境 |
hé guī kùn jìng |
compliance dilemma |
合作主义 |
hé zuò zhǔ yì |
cooperatism |
核心模块 |
hé xīn mó kuài |
core module |
黑客 |
hēi kè |
hacker |
机器学习 |
jī qì xué xí |
machine learning |
基本输入输出系统 |
jī běn shū rù shū chū
xì tǒng |
BIOS, basic
input/output system |
基础设施云平台安全风险 |
jī chǔ shè shī yún
píng tái ān quán fēng xiǎn |
IaaS cloud platform
security risk |
技术悖论 |
jì shù bèi lùn |
technology paradox |
技术联盟 |
jì shù lián méng |
technology alliance |
技术民族主义 |
jì shù mín zú zhǔ yì |
technological
nationalism |
加密货币 |
jiā mì huò bì |
cryptocurrency |
检测方法 |
jiǎn cè fāng fǎ |
detection method |
建立信任措施 |
jiàn lì xìn rèn cuò
shī |
confidence-building
measures, CBMs |
交互模式 |
jiāo hù mó shì |
interaction mode |
接入安全 |
jiē rù ān quán |
access security |
经济安全 |
jīng jì ān quán |
economic security |
经济竞争 |
jīng jì jìng zhēng |
economic competition |
镜像网站取证 |
jìng xiàng wǎng zhàn
qǔ zhèng |
mirroring website
forensics |
军控路线图 |
jūn kòng lù xiàn tú |
arms control roadmap |
军事安全 |
jūn shì ān quán |
military security |
军事部署 |
jūn shì bù shǔ |
military deployment |
开源情报 |
kāi yuán qíng bào |
open source
intelligence |
科技竞争 |
kē jì jìng zhēng |
technological
competition |
可信时间 |
kě xìn shí jiān |
credible time |
可验证凭证 |
kě yàn zhèng píng
zhèng |
verifiable credential |
可追溯 |
kě zhuī sù |
traceable |
可追溯性 |
kě zhuī sù xìng |
traceability |
控制质量点 |
kòng zhì zhì liáng
diǎn |
control quality point |
跨地域 |
kuà dì yù |
cross-regional (e.g.,
data sharing) |
跨境数据流动 |
kuà jìng shù jù liú
dòng |
cross-border data flow |
跨境刑事执法 |
kuà jìng xíng shì zhí
fǎ |
cross-border
investigation |
跨系统 |
kuà xì tǒng |
cross-system (e.g.,
data sharing) |
跨主体 |
kuà zhǔ tǐ |
cross-subject (e.g.,
data sharing) |
蓝牙安全 |
lán yá ān quán |
Bluetooth security |
勒索病毒 |
lè suǒ bìng dú |
ransomware |
立足点 |
lì zú diǎn |
foothold |
利益平衡 |
lì yì píng héng |
interest balance |
量子保密通信 |
liáng zǐ bǎo mì tōng
xìn |
quantum secure
communication |
量子计算 |
liáng zǐ jì suàn |
quantum computing |
量子密钥分发 |
liáng zǐ mì yuè fēn fā
|
quantum key
distribution |
量子随机数发生器 |
liáng zǐ suí jī shù fā
shēng qì |
quantum random number
generator |
零信任 |
líng xìn rèn |
zero trust |
零信任落地 |
líng xìn rèn luò dì |
zero trust practice |
零信任转型 |
líng xìn rèn zhuǎn
xíng |
zero trust
transformation |
龙芯处理器平台 |
lóng xīn chǔ lǐ qì
píng tái |
Loongson processor
platform |
漏洞管理 |
lòu dòng guǎn lǐ |
vulnerability
management |
路径选择 |
lù jìng xuǎn zé |
path choice |
密码服务 |
mì mǎ fú wù |
cryptographic service |
密码管理 |
mì mǎ guǎn lǐ |
cryptographic
management |
密码技术 |
mì mǎ jì shù |
cryptography;
cryptography technology |
密码模块 |
mì mǎ mó kuài |
cryptographic module |
密码融合 |
mì mǎ róng hé |
cryptographic fusion |
密码体系 |
mì mǎ tǐ xì |
cryptographic system |
密码学 |
mì mǎ xué |
cryptography |
密码应用 |
mì mǎ yīng yòng |
cryptographic
application |
密码应用创新 |
mì mǎ yīng yòng chuàng
xīn |
cryptographic
application innovation |
密码中间件 |
mì mǎ zhōng jiān jiàn |
cryptographic
middleware |
面向多处理器 |
miàn xiàng duō chǔ lǐ
qì |
multi-kind processor |
民族化浪潮 |
mín zú huà làng cháo |
nationalization |
敏感个人信息 |
mǐn gǎn gè rén xìn xī |
personal sensitive
information |
明确定级 |
míng què dìng jí |
clear grading |
内存取证 |
nèi cún qǔ zhèng |
internal access
forensics; memory forensics |
内嵌防护 |
nèi qiàn fáng hù |
embedded protection |
内生安全 |
nèi shēng ān quán |
endogenous safety |
内生安全防御体系 |
nèi shēng ān quán fáng
yù tǐ xì |
endogenous security
defense system |
内网安全 |
nèi wǎng ān quán |
intranet security |
难以保证真实性 |
nán yǐ bǎo zhèng zhēn
shí xìng |
difficult to guarantee
authenticity |
偏见 |
piān jiàn |
bias |
平台垄断风险 |
píng tái lǒng duàn
fēng xiǎn |
platform monopoly risk |
平台治理 |
píng tái zhì lǐ |
network platform
governance |
启发式方法 |
qǐ fā shì fāng fǎ |
heuristic |
启示建议 |
qǐ shì jiàn yì |
enlightenment
suggestion |
嵌入式安全芯片 |
qiàn rù shì ān quán
xīn piàn |
embedded secure access
module, ESAM |
情报策划 |
qíng bào cè huá |
intelligence planning |
情报界 |
qíng bào jiè |
intelligence community |
情报应用 |
qíng bào yīng yòng |
information
application |
情报主导警务 |
qíng bào zhǔ dǎo jǐng
wù |
intelligence dominates
policing |
区块链 |
qū kuài liàn |
blockchain |
区块链安全 |
qū kuài liàn ān quán |
blockchain security |
区块链技术 |
qū kuài liàn jì shù |
blockchain technology |
区块链体系架构 |
qū kuài liàn tǐ xì jià
gòu |
blockchain
architecture |
区块链信息孤岛 |
qū kuài liàn xìn xī gū
dǎo |
blockchain information
island |
去标识化 |
qù biāo shí huà |
de identification |
去信任化 |
qù xìn rèn huà |
detrust |
去中心化 |
qù zhōng xīn huà |
decentralization |
全标签 |
quán biāo qiān |
security tag |
全程可信 |
quán chéng kě xìn |
whole trusted |
全国家 |
quán guó jiā |
whole of nation |
全球数据安全倡议 |
quán qiú shù jù ān
quán chàng yì |
Global Data Security
Initiative |
全球威胁评估 |
quán qiú wēi xié píng
gū |
global threat
assessment |
全生命周期 |
quán shēng mìng zhōu
qī |
whole life cycle |
全系统
|
quán xì tǒng |
whole of system |
全政府 |
quán zhèng fǔ |
whole of government |
权益证明 |
quán yì zhèng míng |
Proof-of-Stake |
群体计算 |
qún tǐ jì suàn |
population computing |
人工免疫系统 |
rén gōng miǎn yì xì
tǒng |
artificial immune
system |
人工智能 |
rén gōng zhì néng |
artificial
intelligence; AI |
人脸识别 |
rén liǎn shí bié |
face recognition;
facial recognition |
人脸识别技术 |
rén liǎn shí bié jì
shù |
Face recognition
technologies, FRTs |
认证 |
rèn zhèng |
authentication |
入侵检测 |
rù qīn jiǎn cè |
intrusion detection |
软件定义广域网 |
ruǎn jiàn dìng yì
guǎng yù wǎng |
Software Defined
Network, SD-WAN |
软件定义网络 |
ruǎn jiàn dìng yì wǎng
luò |
Software Defined
Network, SDN |
商用密码 |
shāng yòng mì mǎ |
commercial
cryptography |
设备日志采集
|
shè bèi rì zhì cǎi
jí |
equipment log
collection |
社会认知 |
shè huì rèn zhī |
social cognition |
深层国家 |
shēn céng guó jiā |
deep state |
深度学习 |
shēn dù xué xí |
deep learning |
生物免疫系统 |
shēng wù miǎn yì xì
tǒng |
biological immune
system |
生物识别信息 |
shēng wù shí bié xìn
xī |
biometric information |
剩余信息保护 |
shèng yú xìn xī bǎo hù
|
remaining information
protection |
施雷姆斯案 |
shī léi mǔ sī àn |
Schrems |
实施方法 |
shí shī fāng fǎ |
implementation method |
实时化 |
shí shí huà |
real-time |
实时在线加/解密 |
shí shí zài xiàn jiā /
jiě mì |
real-time online
encryption/decryption |
事后追溯 |
shì hòu zhuī sù |
afterward traceability |
事前保护 |
shì qián bǎo hù |
prior protection |
事中响应 |
shì zhōng xiǎng yīng |
in-process
correspondence |
授权操作 |
shòu quán cāo zuò |
authorized operation |
授权决策 |
shòu quán jué cè |
authorization decision |
数据安全 |
shù jù ān quán |
data security |
数据安全技术 |
shù jù ān quán jì shù |
data security
technology |
数据保护 |
shù jù bǎo hù |
data protection |
数据本地化 |
shù jù běn dì huà |
data localization |
数据标签 |
shù jù biāo qiān |
data tag |
数据采集 |
shù jù cǎi jí |
data acquisition |
数据分析 |
shù jù fēn xī |
data analysis |
数据共享 |
shù jù gòng xiǎng |
data sharing |
数据获取 |
shù jù huò qǔ |
data obtaining |
数据集 |
shù jù jí |
dataset |
数据价值 |
shù jù jià zhí |
digital value |
数据交换 |
shù jù jiāo huàn |
data exchange |
数据可信溯源 |
shù jù kě xìn sù yuán |
data trusted
traceability |
数据跨境流动 |
shù jù kuà jìng liú
dòng |
data cross-border flow |
数据流通 |
shù jù liú tōng |
data flow |
数据生产要素 |
shù jù shēng chǎn yào
sù |
data production factor |
数据透明加密 |
shù jù tòu míng jiā mì
|
data transparent
encryption |
数据脱敏 |
shù jù tuō mǐn |
data desensitization |
数据要素 |
shù jù yào sù |
data element |
数据应用安全 |
shù jù yīng yòng ān
quán |
data application
security |
数据运营安全 |
shù jù yùn yíng ān
quán |
DataSecOps |
数据治理 |
shù jù zhì lǐ |
data governance |
数据质量管理 |
shù jù zhì liáng guǎn
lǐ |
data quality
management |
数字地缘 |
shù zì dì yuán |
digital geography |
数字共同体 |
shù zì gòng tóng tǐ |
digital commons |
数字化 |
shù zì huà |
digitalization |
数字货币 |
shù zì huò bì |
digital currency |
数字货币取证 |
shù zì huò bì qǔ zhèng
|
digital currency
forensics |
数字基础设施 |
shù zì jī chǔ shè shī |
digital infrastructure |
数字金融 |
shù zì jīn róng |
digital finance |
数字经济 |
shù zì jīng jì |
digital economy |
数字冷战 |
shù zì lěng zhàn |
digital Cold War |
数字签名 |
shù zì qiān míng |
digital signature |
数字身份 |
shù zì shēn fèn |
digital identity |
数字政府 |
shù zì zhèng fǔ |
digital government |
双循环生态 |
shuāng xún huán shēng
tài |
dual-cycle ecosystem |
司法鉴定中认定难 |
sī fǎ jiàn dìng zhōng
rèn dìng nán |
difficult
identification in judicial expertise |
私有云 |
sī yǒu yún |
private cloud |
态势感知 |
tài shì gǎn zhī |
situation awareness |
体系定位 |
tǐ xì dìng wèi |
system orientation |
同意为王 |
tóng yì wéi wáng |
consent is king |
统一门户 |
tǒng yī mén hù |
unified portal |
图像硬件加密 |
tú xiàng yìng jiàn jiā
mì |
image hardware
encryption |
吞吐量 |
tūn tǔ liáng |
throughput |
网络安全 |
wǎng luò ān quán |
network security |
网络安全体制 |
wǎng luò ān quán tǐ
zhì |
cyber security system |
网络安全要求 |
wǎng luò ān quán yào
qiú |
cybersecurity
requirement |
网络安全战略 |
wǎng luò ān quán zhàn
lüè |
cyber security
strategy |
网络犯罪 |
wǎng luò fàn zuì |
cybercrime |
网络犯罪分子 |
wǎng luò fàn zuì fēn
zǐ |
cybercriminal |
网络防御 |
wǎng luò fáng yù |
cyber defense |
网络攻防 |
wǎng luò gōng fáng |
cyber attack and
defense |
网络架构 |
wǎng luò jià gòu |
network architecture |
网络军工产业 |
wǎng luò jūn gōng chǎn
yè |
cyber military
industry |
网络军控 |
wǎng luò jūn kòng |
cyber arms control |
网络空间 |
wǎng luò kōng jiān |
cyberspace |
网络空间安全 |
wǎng luò kōng jiān ān
quán |
cyberspace security |
网络空间大国关系 |
wǎng luò kōng jiān dà
guó guān xì |
great powers
cyberspace relations |
网络空间全球治理 |
wǎng luò kōng jiān
quán qiú zhì lǐ |
global Internet
governance |
网络空间日光浴委员会 |
wǎng luò kōng jiān rì
guāng yù wěi yuán huì |
Cyberspace Solarium
Commission (of the United States) |
网络空间战略 |
wǎng luò kōng jiān
zhàn lüè |
cyberspace strategy |
网络空间治理 |
wǎng luò kōng jiān zhì
lǐ |
cyberspace governance |
网络空间作战 |
wǎng luò kōng jiān zuò
zhàn |
cyberspace operation |
网络流量取 |
wǎng luò liú liáng qǔ |
network traffic
forensics |
网络漏洞 |
wǎng luò lòu dòng |
vulnerability |
网络入侵 |
wǎng luò rù qīn |
network intrusion |
网络社交 |
wǎng luò shè jiāo |
social networking |
网络身份认证 |
wǎng luò shēn fèn rèn
zhèng |
network trusted
identity authentication |
网络威慑 |
wǎng luò wēi shè |
cyber deterrence |
网络威慑 |
wǎng luò wēi shè |
cyber deterrence |
网络武器扩散 |
wǎng luò wǔ qì kuò sàn
|
proliferation of cyber
weapon |
网络战 |
wǎng luò zhàn |
cyber warfare |
网络战略 |
wǎng luò zhàn lüè |
cyber strategy |
网络主权 |
wǎng luò zhǔ quán |
cyber sovereignty |
网络作战 |
wǎng luò zuò zhàn |
cyber operation |
网络作战力量 |
wǎng luò zuò zhàn lì
liáng |
cyber warfare force |
网络作战能力 |
wǎng luò zuò zhàn néng
lì |
cyber warfare
capabilities. |
威慑战略 |
wēi shè zhàn lüè |
deterrence strategy |
微隔离 |
wēi gé lí |
micro segmentation |
无介质密码签名运算 |
wú jiè zhì mì mǎ qiān
míng yùn suàn |
media free password
signature operation |
无人机飞 |
wú rén jī fēi |
UAV, drone |
武器系统 |
wǔ qì xì tǒng |
weapon system |
现场可编程逻辑门阵列 |
xiàn cháng kě biān
chéng luó jí mén zhèn liè |
field-programmable
gate arra y, FPGA |
现场可编程门阵列 |
xiàn cháng kě biān
chéng mén zhèn liè |
Field Programmable
Gate Array, FPGA |
线性反馈移位寄存器 |
xiàn xìng fǎn kuì yí
wèi jì cún qì |
linear-feedback shift
register, LFSR |
信任机制 |
xìn rèn jī zhì |
trust mechanism |
信息安全 |
xìn xī ān quán |
information security |
信息安全陷阱 |
xìn xī ān quán xiàn
jǐng |
information security
trap |
信息保护 |
xìn xī bǎo hù |
information protection |
信息化 |
xìn xī huà |
informatization |
信息披露 |
xìn xī pī lù |
information disclosure |
信息资产 |
xìn xī zī chǎn |
information assests |
虚假信息 |
xū jiǎ xìn xī |
disinformation |
虚拟社会战 |
xū nǐ shè huì zhàn |
virtual societal
warfare |
虚拟专用网络取证 |
xū nǐ zhuān yòng wǎng
luò qǔ zhèng |
VPN forensics |
选举安全 |
xuǎn jǔ ān quán |
election security |
洋葱浏览器取证 |
yáng cōng liú lǎn qì
qǔ zhèng |
onion browser
forensics |
洋葱浏览器取证 |
yáng cōng liú lǎn qì
qǔ zhèng |
TOR browser forensics |
业务中台 |
yè wù zhōng tái |
middle platform |
易篡改 |
yì cuàn gǎi |
easy tampering |
易伪造 |
yì wěi zào |
easy forgery |
疫情大流行 |
yì qíng dà liú xíng |
epidemic |
隐蔽 |
yǐn bì |
masked (e.g., cyber
attack 网络攻击) |
隐私 |
yǐn sī |
privacy |
隐私保护 |
yǐn sī bǎo hù |
privacy protection |
隐私保护 |
yǐn sī bǎo hù |
privacy protection |
隐私盾 |
yǐn sī dùn |
privacy shield |
印度计算机应急响应组 |
yìn dù jì suàn jī yīng
jí xiǎng yīng zǔ |
Indian Computer
Emergency Response Team, CERT-In |
应用场景 |
yīng yòng cháng jǐng |
application scenario |
硬件加密 |
yìng jiàn jiā mì |
hardware encryption |
远程办公 |
yuǎn chéng bàn gōng |
telecommuting |
云安全 |
yún ān quán |
cloud security |
云化迁移 |
yún huà qiān yí |
cloud migration |
云计算 |
yún jì suàn |
cloud computing |
云平台安全 |
yún píng tái ān quán |
cloud platform
security |
杂凑算法 |
zá còu suàn fǎ |
hash |
噪声 |
zào shēng |
noisy (e.g., cyber
attack 网络攻击) |
展示平台 |
zhǎn shì píng tái |
display platform |
战略管理 |
zhàn lüèguǎn lǐ |
strategic management |
震网攻击事件 |
zhèn wǎng gōng jī shì
jiàn |
Stuxnet attack ( malicious computer worm
attack in 2020) |
证据链 |
zhèng jù liàn |
evidence chain |
政策框架 |
zhèng cè kuàng jià |
policy framework |
政策平衡 |
zhèng cè píng héng |
policy balance |
政务密码 |
zhèng wù mì mǎ |
government
cryptographic |
政务数据安全 |
zhèng wù shù jù ān
quán |
government data
security |
政务数据安全架构 |
zhèng wù shù jù ān
quán jià gòu |
government data
security architecture |
政务数据共享 |
zhèng wù shù jù gòng
xiǎng |
government affairs
data sharing |
政务信息系统 |
zhèng wù xìn xī xì
tǒng |
government information
system |
政治安全 |
zhèng zhì ān quán |
political security |
知情同意 |
zhī qíng tóng yì |
informed consent |
制度定位 |
zhì dù dìng wèi |
rule orientation |
质量管理体系 |
zhì liáng guǎn lǐ tǐ
xì |
quality management
system |
致命性自主武器 |
zhì mìng xìng zì zhǔ
wǔ qì |
lethal autonomous
weapons |
智慧电力 |
zhì huì diàn lì |
smart power |
智媒体 |
zhì méi tǐ |
smart media |
智能合约 |
zhì néng hé yuē |
smart contract |
智能合约支持状况及隐私保护措施 |
zhì néng hé yuē zhī
chí zhuàng kuàng jí yǐn sī bǎo hù cuò shī |
smart contract support
status and privacy protection measures |
智能军事技术 |
zhì néng jūn shì jì
shù |
intelligent military
technology |
智能网关 |
zhì néng wǎng guān |
intelligent gateway |
智能协议 |
zhì néng xié yì |
intelligent protocol |
中间件 |
zhōng jiān jiàn |
middleware |
中央银行数字货币 |
zhōng yāng yín xíng
shù zì huò bì |
central bank digital
currency |
终端安全 |
zhōng duān ān quán |
computer terminal
security |
终端自动发现 |
zhōng duān zì dòng fā
xiàn |
terminal automatic
discovery |
注入攻击 |
zhù rù gōng jī |
injection attack |
资产探测 |
zī chǎn tàn cè |
asset detection |
资料汇编 |
zī liào huì biān |
data compilation |
自安全网络 |
zì ān quán wǎng luò |
self-secure network |
自动化决策 |
zì dòng huà jué cè |
automated decision
making |
自杀伤性 |
zì shā shāng xìng |
self-destructiveness |
自主可控 |
zì zhǔ kě kòng |
independently
controllable |
自主身份 |
zì zhǔ shēn fèn |
self-sovereign
identity |
综合网络中心 |
zōng hé wǎng luò zhōng
xīn |
Integrated Cyber
Center (of the United States) |
总体指导 |
zǒng tǐ zhǐ dǎo |
overarching guidance |
组织采取 |
zǔ zhī cǎi qǔ |
mass scanning |
组织机构自评估 |
zǔ zhī jī gòu zì píng
gū |
organization
self-assessment |