BIOS口令

BIOS kǒu líng

BIOS (basic input/output system) password

IP地址信用价模型

IP dì zhǐ xìn yòng píng jià mó xíng

IP address credit evaluation model

安情

ān qíng bào bù mén

public security intelligence department

安全保护对

ān quán bǎo hù duì cè

security protection countermeasure

安全

ān quán biāo zhǔn

safety standard

安全港

ān quán gǎng

safe harbor

安全检查

ān quán jiǎn chá

security inspection

安全

ān quán lián méng zhànlüè

security union strategy

安全

ān quán píng gū

security assessment

安全事件特征提取

ān quán shì jiàn tè zhēng tí qǔ

security event feature extraction

安全威

ān quán wēi xié

security threat

安全芯片

ān quán xīn piàn

secure element

安全云管平台

ān quán yún guǎn píng tái

secure cloud management platform

àn wǎng

dark web

白帽子

bái mào zǐ

white hat

保留格式加密

bǎo liú gé shì jiā mì

format-preserving encryption

保密管理

bǎo mì guǎn lǐ

confidentiality management

叶斯定理

bèi yè sī dìng lǐ

Bayes’ theorem

界防

biān jiè fáng hù

border protection

边缘

biān yuán cún chǔ

edge storage

标识

biāo shí mì mǎ jì shù

identification cryptography; identity-based cryptography

准化

biāo zhǔn huà

standardization

准体系

biāo zhǔn tǐ xì

standard system; standard architecture

不可

bù kě cuàn gǎi  

tamper proof

不同意的情

bù tóng yì de qíng kuàng

non-consent scenario

采信率低

cǎi xìn shuài dī

low acceptance rate

检测

chǎn pǐn jiǎn cè  

product testing

品制定

chǎn pǐn zhì dìng

product development

集成

chí xù jí chéng

continuous integration

chuàng xīn  

innovation

次序保留加密

cì xù bǎo liú jiā mì

order-preserving encryption

模准入

dà guī mó zhǔn rù yùn dòng  

mass access campaign

dà guó jìng zhēng

great power competition

dà shù jù

big data

据分析

dà shù jù fēn xī

big data analysis

据治理

dà shù jù zhì lǐ

big data governance

光子探

dān guāng zǐ tàn cè qì

single photon detector

政治

dì yuán zhèng zhì

geopolitics

第三方认证

dì sān fāng píng gū rèn zhèng

third-party assessment and certification

diàn cí zhàn

electromagnetic warfare

认证

diàn zǐ rèn zhèng  

electronic authentication

子商务谈

diàn zǐ shāng wù tán pàn

e-commerce negotiation

diàn zǐ shù jù

electronic data

diàn zǐ shù jù zhèng

digital evidence

顶层设计

dǐng céng shè jì

top-level design

动态算力

dòng tài suàn lì

dynamic computing power

动态信息系

dòng tài xìn xī xì tǒng

dynamic information system

动态智能

dòng tài zhì néng biān pái

dynamic intelligent arrangement

加密

duì chēng jiā mì

symmetric encryption

多方存

duō fāng cún zhèng  

multi-party storage

多方

duō fāng xié tóng

multi-party coordination

多利益相

duō lì yì xiāng guān fāng

multi-stakeholders

fá kuǎn biāo zhǔn

penalty standard

防克隆

fáng kè lóng

anti-cloning

防御措施

fáng yù cuò shī  

defensive measure

访问控制

fǎng wèn kòng zhì

access control

分布式标识

fēn bù shì biāo shí

decentralized identifier

分布式身认证

fēn bù shì shēn fèn rèn zhèng

decentralized identity authentication

分布式本技

fēn bù shì zhàng běn jì shù

distributed ledger technology

风险

fēng xiǎn

risk

风险分析

fēng xiǎn fēn xī

risk analysis

治理

fú wù zhì lǐ

service governance

面示范

fù miàn shì fàn

negative demonstration

据保

gè rén shù jù bǎo hù

personal data protection; personal information protection

人信息流

gè rén xìn xī liú dòng

personal information flow

gè rén yǐn sī

privacy

gōng yè hù lián wǎng

industrial internet

公安情报产

gōng ān qíng bào chǎn pǐn

public security intelligence product

公私合作

gōng sī hé zuò

public-private cooperation

机制

gòng shí jī zhì

consensus mechanism

共享据交

gòng xiǎng shù jù jiāo huàn

shared data exchange

共享据使用

gòng xiǎng shù jù shǐ yòng

shared data usage

共享据准

gòng xiǎng shù jù zhǔn bèi

shared data preparation

础设施保

guān jiàn jī chǔ shè shī bǎo hù

critical infrastructure protection

信息基础设

guān jiàn xìn xī jī chǔ shè shī

critical information infrastructure

操作系

guó chǎn cāo zuò xì tǒng

domestic operating system

产计算机

guó chǎn jì suàn jī

domestic computer

guó fáng wǎng luò jú

defense cyber agency

guó jì fǎ

international law

际规

guó jì guī fàn

international norms

合作机制

guó jì hé zuò jī zhì

international cooperation mechanism

际稳

guó jì wěn dìng

international stability

家安全

guó jiā ān quán

national security

家安全

guó jiā ān quán zhàn lüè

national security strategy

家互

guó jiā hù lián wǎng

national Internet

络总监

guó jiā wǎng luò zǒng jiān

National Cyber Director (of the United States)

程方法

guò chéng fāng fǎ

process method

航拍

háng pāi tú xiàng

aerial imagery

合法性基

hé fǎ xìng jī chǔ

legitimate basis

困境

hé guī kùn jìng

compliance dilemma

合作主

hé zuò zhǔ yì

cooperatism

核心模

hé xīn mó kuài

core module

黑客

hēi kè

hacker

机器

jī qì xué xí

machine learning

基本出系

jī běn shū rù shū chū xì tǒng

BIOS, basic input/output system

础设施云平台安全风险

jī chǔ shè shī yún píng tái ān quán fēng xiǎn

IaaS cloud platform security risk

jì shù bèi lùn

technology paradox

术联

jì shù lián méng

technology alliance

民族主

jì shù mín zú zhǔ yì

technological nationalism

加密货币

jiā mì huò bì

cryptocurrency

检测方法

jiǎn cè fāng fǎ

detection method

建立信任措施

jiàn lì xìn rèn cuò shī

confidence-building measures, CBMs

交互模式

jiāo hù mó shì

interaction mode

接入安全

jiē rù ān quán

access security

经济安全

jīng jì ān quán

economic security

经济竞

jīng jì jìng zhēng

economic competition

站取

jìng xiàng wǎng zhàn qǔ zhèng

mirroring website forensics

控路线图

jūn kòng lù xiàn tú

arms control roadmap

事安全

jūn shì ān quán

military security

事部署

jūn shì bù shǔ

military deployment

源情

kāi yuán qíng bào

open source intelligence

科技

kē jì jìng zhēng

technological competition

可信时间

kě xìn shí jiān

credible time

验证

kě yàn zhèng píng zhèng

verifiable credential

可追溯

kě zhuī sù  

traceable

可追溯性

kě zhuī sù xìng

traceability

控制量点

kòng zhì zhì liáng diǎn  

control quality point

跨地域

kuà dì yù

cross-regional (e.g., data sharing)

跨境据流

kuà jìng shù jù liú dòng

cross-border data flow

跨境刑事

kuà jìng xíng shì zhí fǎ

cross-border investigation

跨系

kuà xì tǒng

cross-system (e.g., data sharing)

跨主体

kuà zhǔ tǐ  

cross-subject (e.g., data sharing)

牙安全

lán yá ān quán

Bluetooth security

勒索病毒

lè suǒ bìng dú

ransomware

立足点

lì zú diǎn

foothold

利益平衡

lì yì píng héng

interest balance

量子保密通信

liáng zǐ bǎo mì tōng xìn

quantum secure communication

量子

liáng zǐ jì suàn

quantum computing

量子密

liáng zǐ mì yuè fēn fā

quantum key distribution

量子生器

liáng zǐ suí jī shù fā shēng qì

quantum random number generator

零信任

líng xìn rèn

zero trust

零信任落地

líng xìn rèn luò dì

zero trust practice

零信任

líng xìn rèn zhuǎn xíng

zero trust transformation

理器平台

lóng xīn chǔ lǐ qì píng tái

Loongson processor platform

漏洞管理

lòu dòng guǎn lǐ

vulnerability management

选择

lù jìng xuǎn zé

path choice

mì mǎ fú wù

cryptographic service

管理

mì mǎ guǎn lǐ

cryptographic management

mì mǎ jì shù

cryptography; cryptography technology

mì mǎ mó kuài

cryptographic module

融合

mì mǎ róng hé

cryptographic fusion

体系

mì mǎ tǐ xì

cryptographic system

mì mǎ xué

cryptography

码应

mì mǎ yīng yòng

cryptographic application

码应

mì mǎ yīng yòng chuàng xīn

cryptographic application innovation

mì mǎ zhōng jiān jiàn

cryptographic middleware

面向多理器

miàn xiàng duō chǔ lǐ qì

multi-kind processor

民族化浪潮

mín zú huà làng cháo

nationalization

敏感人信息

mǐn gǎn gè rén xìn xī

personal sensitive information

明确定

míng què dìng jí

clear grading

存取

nèi cún qǔ zhèng

internal access forensics; memory forensics

嵌防

nèi qiàn fáng hù

embedded protection

生安全

nèi shēng ān quán

endogenous safety

生安全防御体系

nèi shēng ān quán fáng yù tǐ xì

endogenous security defense system

内网安全

nèi wǎng ān quán

intranet security

以保

nán yǐ bǎo zhèng zhēn shí xìng

difficult to guarantee authenticity

piān jiàn

bias

平台风险

píng tái lǒng duàn fēng xiǎn

platform monopoly risk

平台治理

píng tái zhì lǐ

network platform governance

式方法

qǐ fā shì fāng fǎ

heuristic

示建

qǐ shì jiàn yì

enlightenment suggestion

嵌入式安全芯片

qiàn rù shì ān quán xīn piàn

embedded secure access module, ESAM

qíng bào cè huá

intelligence planning

qíng bào jiè

intelligence community

报应

qíng bào yīng yòng

information application

qíng bào zhǔ dǎo jǐng wù

intelligence dominates policing

块链

qū kuài liàn

blockchain

块链安全

qū kuài liàn ān quán

blockchain security

块链

qū kuài liàn jì shù

blockchain technology

块链体系架

qū kuài liàn tǐ xì jià gòu

blockchain architecture

块链信息孤

qū kuài liàn xìn xī gū dǎo

blockchain information island

标识

qù biāo shí huà

de identification

去信任化

qù xìn rèn huà

detrust

去中心化

qù zhōng xīn huà

decentralization

标签

quán biāo qiān

security tag

全程可信

quán chéng kě xìn

whole trusted

quán guó jiā

 whole of nation

全球据安全倡

quán qiú shù jù ān quán chàng yì

Global Data Security Initiative

全球威胁评

quán qiú wēi xié píng gū

global threat assessment

全生命周期

quán shēng mìng zhōu qī

whole life cycle

全系

quán xì tǒng  

whole of system

全政府

quán zhèng fǔ  

whole of government

quán yì zhèng míng

Proof-of-Stake

群体

qún tǐ jì suàn

population computing

人工免疫系

rén gōng miǎn yì xì tǒng

artificial immune system

人工智能

rén gōng zhì néng

artificial intelligence; AI

脸识

rén liǎn shí bié

face recognition; facial recognition

脸识

rén liǎn shí bié jì shù

Face recognition technologies, FRTs

认证

rèn zhèng

authentication

入侵检测

rù qīn jiǎn cè

intrusion detection

件定广域

ruǎn jiàn dìng yì guǎng yù wǎng

Software Defined Network, SD-WAN

件定

ruǎn jiàn dìng yì wǎng luò

Software Defined Network, SDN

商用密

shāng yòng mì mǎ

commercial cryptography

设备日志采集

shè bèi rì zhì cǎi jí  

equipment log collection

shè huì rèn zhī

social cognition

shēn céng guó jiā

deep state

深度

shēn dù xué xí

deep learning

生物免疫系

shēng wù miǎn yì xì tǒng

biological immune system

生物信息

shēng wù shí bié xìn xī

biometric information

剩余信息保

shèng yú xìn xī bǎo hù

remaining information protection

施雷姆斯案

shī léi mǔ sī àn

Schrems

施方法

shí shī fāng fǎ

implementation method

实时

shí shí huà

real-time

实时线/解密

shí shí zài xiàn jiā / jiě mì

real-time online encryption/decryption

事后追溯

shì hòu zhuī sù

afterward traceability

事前保

shì qián bǎo hù

prior protection

事中

shì zhōng xiǎng yīng

in-process correspondence

操作

shòu quán cāo zuò

authorized operation

shòu quán jué cè

authorization decision

据安全

shù jù ān quán

data security

据安全技

shù jù ān quán jì shù

data security technology

据保

shù jù bǎo hù

data protection

据本地化

shù jù běn dì huà

data localization

标签

shù jù biāo qiān

data tag

据采集

shù jù cǎi jí

data acquisition

据分析

shù jù fēn xī

data analysis

据共享

shù jù gòng xiǎng

data sharing

shù jù huò qǔ

data obtaining

据集

shù jù jí

dataset

据价

shù jù jià zhí

digital value

据交

shù jù jiāo huàn

data exchange

据可信溯源

shù jù kě xìn sù yuán

data trusted traceability

据跨境流

shù jù kuà jìng liú dòng

data cross-border flow

据流通

shù jù liú tōng

data flow

据生要素

shù jù shēng chǎn yào sù

data production factor

据透明加密

shù jù tòu míng jiā mì

data transparent encryption

shù jù tuō mǐn

data desensitization

据要素

shù jù yào sù

data element

用安全

shù jù yīng yòng ān quán

data application security

安全

shù jù yùn yíng ān quán

DataSecOps

据治理

shù jù zhì lǐ

data governance

量管理

shù jù zhì liáng guǎn lǐ

data quality management

字地

shù zì dì yuán

digital geography

字共同体

shù zì gòng tóng tǐ

digital commons

字化

shù zì huà

digitalization

货币

shù zì huò bì

digital currency

货币

shù zì huò bì qǔ zhèng

digital currency forensics

字基础设

shù zì jī chǔ shè shī

digital infrastructure

字金融

shù zì jīn róng

digital finance

经济

shù zì jīng jì

digital economy

字冷

shù zì lěng zhàn

digital Cold War

shù zì qiān míng  

digital signature

字身

shù zì shēn fèn

digital identity

字政府

shù zì zhèng fǔ

digital government

shuāng xún huán shēng tài

dual-cycle ecosystem

司法定中

sī fǎ jiàn dìng zhōng rèn dìng nán  

difficult identification in judicial expertise

私有云

sī yǒu yún

private cloud

态势感知

tài shì gǎn zhī

situation awareness

体系定位

tǐ xì dìng wèi

system orientation

同意

tóng yì wéi wáng

consent is king

tǒng yī mén hù

unified portal

像硬件加密

tú xiàng yìng jiàn jiā mì

image hardware encryption

吐量

tūn tǔ liáng

throughput

安全

wǎng luò ān quán

network security

安全体制

wǎng luò ān quán tǐ zhì

cyber security system

安全要求

wǎng luò ān quán yào qiú

cybersecurity requirement

安全

wǎng luò ān quán zhàn lüè

cyber security strategy

犯罪

wǎng luò fàn zuì

cybercrime

犯罪分子

wǎng luò fàn zuì fēn zǐ

cybercriminal

防御

wǎng luò fáng yù

cyber defense

攻防

wǎng luò gōng fáng

cyber attack and defense

wǎng luò jià gòu

network architecture

络军产业

wǎng luò jūn gōng chǎn yè

cyber military industry

络军

wǎng luò jūn kòng

cyber arms control

wǎng luò kōng jiān

cyberspace

安全

wǎng luò kōng jiān ān quán

cyberspace security

国关

wǎng luò kōng jiān dà guó guān xì

great powers cyberspace relations

全球治理

wǎng luò kōng jiān quán qiú zhì lǐ

global Internet governance

日光浴委

wǎng luò kōng jiān rì guāng yù wěi yuán huì

Cyberspace Solarium Commission (of the United States)

间战

wǎng luò kōng jiān zhàn lüè

cyberspace strategy

治理

wǎng luò kōng jiān zhì lǐ

cyberspace governance

wǎng luò kōng jiān zuò zhàn

cyberspace operation

流量取

wǎng luò liú liáng qǔ

network traffic forensics

漏洞

wǎng luò lòu dòng

vulnerability

入侵

wǎng luò rù qīn

network intrusion

社交

wǎng luò shè jiāo

social networking

认证

wǎng luò shēn fèn rèn zhèng

network trusted identity authentication

wǎng luò wēi shè

cyber deterrence

wǎng luò wēi shè

cyber deterrence

武器

wǎng luò wǔ qì kuò sàn

proliferation of cyber weapon

络战

wǎng luò zhàn

cyber warfare

络战

wǎng luò zhàn lüè

cyber strategy

wǎng luò zhǔ quán

cyber sovereignty

wǎng luò zuò zhàn

cyber operation

力量

wǎng luò zuò zhàn lì liáng

cyber warfare force

能力

wǎng luò zuò zhàn néng lì

cyber warfare capabilities.

慑战

wēi shè zhàn lüè

deterrence strategy

微隔离

wēi gé lí

micro segmentation

无介码签

wú jiè zhì mì mǎ qiān míng yùn suàn

media free password signature operation

无人机

wú rén jī fēi

UAV, drone

武器系

wǔ qì xì tǒng

weapon system

现场逻辑

xiàn cháng kě biān chéng luó jí mén zhèn liè

field-programmable gate arra y, FPGA

现场

xiàn cháng kě biān chéng mén zhèn liè

Field Programmable Gate Array, FPGA

线性反移位寄存器

xiàn xìng fǎn kuì yí wèi jì cún qì

linear-feedback shift register, LFSR

信任机制

xìn rèn jī zhì

trust mechanism

信息安全

xìn xī ān quán

information security

信息安全陷

xìn xī ān quán xiàn jǐng

information security trap

信息保

xìn xī bǎo hù

information protection

信息化

xìn xī huà

informatization

信息披露

xìn xī pī lù

information disclosure

信息资产

xìn xī zī chǎn

information assests

假信息

xū jiǎ xìn xī

disinformation

xū nǐ shè huì zhàn

virtual societal warfare

拟专

xū nǐ zhuān yòng wǎng luò qǔ zhèng

VPN forensics

选举安全

xuǎn jǔ ān quán

election security

洋葱浏览器取

yáng cōng liú lǎn qì qǔ zhèng

onion browser forensics

洋葱浏览器取

yáng cōng liú lǎn qì qǔ zhèng

TOR browser forensics

业务中台

yè wù zhōng tái

middle platform

yì cuàn gǎi

easy tampering

yì wěi zào

easy forgery

疫情大流行

yì qíng dà liú xíng

epidemic

yǐn bì

masked (e.g., cyber attack )

yǐn sī

privacy

私保

yǐn sī bǎo hù

privacy protection

私保

yǐn sī bǎo hù

privacy protection

私盾

yǐn sī dùn

privacy shield

印度算机应组

yìn dù jì suàn jī yīng jí xiǎng yīng zǔ

Indian Computer Emergency Response Team, CERT-In

yīng yòng cháng jǐng

application scenario

硬件加密

yìng jiàn jiā mì

hardware encryption

yuǎn chéng bàn gōng

telecommuting

云安全

yún ān quán

cloud security

云化

yún huà qiān yí

cloud migration

yún jì suàn

cloud computing

云平台安全

yún píng tái ān quán

cloud platform security

算法

zá còu suàn fǎ

hash

zào shēng

noisy (e.g., cyber attack )

展示平台

zhǎn shì píng tái

display platform

略管理

zhàn lüèguǎn lǐ

strategic management

事件

zhèn wǎng gōng jī shì jiàn

Stuxnet attack malicious computer worm  attack in 2020

zhèng jù liàn

evidence chain

政策框架

zhèng cè kuàng jià

policy framework

政策平衡

zhèng cè píng héng

policy balance

zhèng wù mì mǎ

government cryptographic

据安全

zhèng wù shù jù ān quán

government data security

据安全架

zhèng wù shù jù ān quán jià gòu

government data security architecture

据共享

zhèng wù shù jù gòng xiǎng

government affairs data sharing

信息系

zhèng wù xìn xī xì tǒng

government information system

政治安全

zhèng zhì ān quán

political security

知情同意

zhī qíng tóng yì

informed consent

制度定位

zhì dù dìng wèi

rule orientation

量管理体系

zhì liáng guǎn lǐ tǐ xì

quality management system

致命性自主武器

zhì mìng xìng zì zhǔ wǔ qì

lethal autonomous weapons

智慧

zhì huì diàn lì

smart power

智媒体

zhì méi tǐ

smart media

智能合

zhì néng hé yuē

smart contract

智能合支持状况私保措施

zhì néng hé yuē zhī chí zhuàng kuàng jí yǐn sī bǎo hù cuò shī

smart contract support status and privacy protection measures

智能事技

zhì néng jūn shì jì shù

intelligent military technology

智能网关

zhì néng wǎng guān

intelligent gateway

智能协议

zhì néng xié yì

intelligent protocol

zhōng jiān jiàn

middleware

中央货币

zhōng yāng yín xíng shù zì huò bì

central bank digital currency

端安全

zhōng duān ān quán

computer terminal security

端自动发现

zhōng duān zì dòng fā xiàn

terminal automatic discovery

注入攻

zhù rù gōng jī

injection attack

资产

zī chǎn tàn cè

asset detection

汇编

zī liào huì biān

data compilation

自安全

zì ān quán wǎng luò

self-secure network

zì dòng huà jué cè

automated decision making

杀伤

zì shā shāng xìng

self-destructiveness

自主可控

zì zhǔ kě kòng

independently controllable

自主身

zì zhǔ shēn fèn

self-sovereign identity

中心

zōng hé wǎng luò zhōng xīn

Integrated Cyber Center (of the United States)

体指

zǒng tǐ zhǐ dǎo

overarching guidance

组织采取

zǔ zhī cǎi qǔ

mass scanning

组织

zǔ zhī jī gòu zì píng gū

organization self-assessment