网络安全相关中英文词汇

合集下载

网络安全英文口语

网络安全英文口语

网络安全英文口语Network SecurityNetwork security is a critical concern in today's digital age. With the increasing reliance on computers and the internet, it is crucial to protect our sensitive information from unauthorized access, data breaches, and other cyber threats. In this article, I will discuss some common terms and phrases related to network security in English.1. Firewall: A firewall is a security device or software that monitors and controls incoming and outgoing network traffic. Its primary goal is to prevent unauthorized access to or from a private network.2. Antivirus: Antivirus software is designed to detect, prevent, and remove malicious software, such as viruses, worms, and Trojan horses. It scans files and programs regularly to identify any potential threats.3. Encryption: Encryption is the process of converting data into a code to prevent unauthorized access or tampering. It ensures that only the intended recipient can decipher the information.4. Phishing: Phishing refers to fraudulent activities wherein the attacker pretends to be a trustworthy entity to obtain sensitive information, such as passwords and credit card details. Phishing attacks often occur through emails or fake websites.5. Malware: Malware is short for malicious software. It is anysoftware intended to cause harm to a computer or network, such as viruses, worms, ransomware, and spyware.6. Two-factor authentication: Two-factor authentication adds an extra layer of security to the authentication process. It requires users to provide two pieces of evidence to verify their identity, typically a password and a unique code sent to their mobile device.7. Data breach: A data breach occurs when unauthorized individuals gain access to sensitive or confidential data. It may result in the theft, disclosure, or manipulation of personal information, financial records, or intellectual property.8. Cyberattack: A cyberattack is an intentional act of compromising computer systems, networks, or data by unauthorized individuals or groups. It can include various techniques like malware attacks, hacking, Denial-of-Service (DoS) attacks, and social engineering.9. Patch: A patch is a piece of software designed to fix vulnerabilities or bugs in a program or system. Regularly applying patches is essential to ensure the security and stability of a network.10. VPN: A Virtual Private Network (VPN) is a secure connection that enables users to access a private network over a public network, such as the internet. It encrypts the communication between the user and the network, ensuring data confidentiality.It is crucial to stay vigilant and be aware of these network security terms and concepts to protect ourselves and our networks frompotential threats. By implementing security measures, such as firewalls, antivirus software, and encryption, individuals and organizations can significantly reduce the risks associated with cyberattacks. Remember, prevention is always better than cure when it comes to network security.。

网络安全相关的词汇

网络安全相关的词汇

网络安全相关的词汇
1. 防火墙(Firewall):用于监控和过滤网络流量的软件或硬件设备,以阻止未经授权的访问和恶意活动。

2. 恶意软件(Malware):指被设计用于侵入计算机系统、损坏功能和获取敏感信息等恶意目的的软件,包括病毒、蠕虫、间谍软件等。

3. DDoS 攻击(Distributed Denial of Service Attack):通过利用大量的计算机或设备对一个目标发动攻击,以使目标无法正常访问或服务中断。

4. 木马(Trojan Horse):指伪装成正常程序或文件的恶意软件,用于在用户不知情的情况下获取敏感信息或远程控制被感染的计算机。

5. 漏洞(Vulnerability):指存在于软件、操作系统或设备中的安全弱点或错误,可能被黑客利用来入侵或攻击系统。

6. 加密(Encryption):将数据转换为密文的过程,以保护数据在传输或存储过程中免受非法访问的保护机制。

7. 嗅探(Sniffing):指黑客使用特殊的工具截取网络上的数据包,以获取敏感信息(如用户名、密码等)的非法行为。

8. 弱口令(Weak Password):指易于被猜测或破解的密码,容易导致账户被入侵或访问授权被滥用。

9. 钓鱼(Phishing):指冒充合法、信任的实体(如银行、网站)发送虚假电子邮件或信息,以获取用户的个人信息、登录凭证等。

10. XSS 攻击(Cross-Site Scripting Attack):指黑客通过在受害者的网页上注入恶意代码,以窃取用户信息、篡改页面或进行其他恶意活动。

网络安全中英文词汇对照

网络安全中英文词汇对照

网络安全中英文词汇对照Access Control List(ACL)访问控制列表access token 访问令牌account lockout 帐号封锁account policies 记帐策略accounts 帐号adapter 适配器adaptive speed leveling 自适应速率等级调整Address Resolution Protocol(ARP) 地址解析协议Administrator account 管理员帐号ARPANET 阿帕网(internet的前身)algorithm 算法alias 别名allocation 分配、定位alias 小应用程序allocation layer 应用层API 应用程序编程接口anlpasswd 一种与Passwd+相似的代理密码检查器applications 应用程序ATM 异步传递模式attack 攻击audio policy 审记策略auditing 审记、监察back-end 后端borde 边界borde gateway 边界网关breakabie 可破密的breach 攻破、违反cipher 密码ciphertext 密文CAlass A domain A类域CAlass B domain B类域CAlass C domain C类域classless addressing 无类地址分配cleartext 明文CSNW Netware客户服务client 客户,客户机client/server 客户机/服务器code 代码COM port COM口(通信端口)CIX 服务提供者computer name 计算机名crack 闯入cryptanalysis 密码分析DLC 数据链路控制decryption 解密database 数据库dafault route 缺省路由dafault share 缺省共享denial of service 拒绝服务dictionary attack 字典式攻击directory 目录directory replication 目录复制domain 域domain controller 域名控制器domain name 域名DNS 域名服务器DNS(Domain Name System,域名系统)是指在Internet上查询域名或IP地址的目录服务系统。

网络安全专业术语

网络安全专业术语

网络安全专业术语AccessControlList(ACL)接见控制列表accesstoken接见令牌accountlockout帐号封闭accountpolicies记帐策略accounts帐号adapter适配器adaptivespeedleveling自适应速率等级调整AddressResolutionProtocol(ARP)地址分析协议Administratoraccount管理员帐号ARPANET阿帕网(internet的前身)algorithm算法alias又名allocation分派、定位alias小应用程序allocationlayer应用层API应用程序编程接口anlpasswd一种与Passwd+相像的代理密码检查器applications应用程序ATM异步传达模式attack攻击audiopolicy审记策略auditing审记、督查back-end后端borde界限bordegateway界限网关breakabie可破密的breach攻破、违犯cipher密码ciphertext密文CAlassAdomainA类域CAlassBdomainB类域CAlassCdomainC类域classlessaddressing无类地址分派cleartext明文CSNWNetware客户服务client客户,客户机client/server客户机/服务器code代码COMportCOM口(通信端口)CIX服务供给者computername计算机名crack闯进cryptanalysis密码剖析DLC数据链路控制decryption解密database数据库dafaultroute缺省路由dafaultshare缺省共享denialofservice拒绝服务dictionaryattack词典式攻击directory目录directoryreplication目录复制domain域domaincontroller域名控制器domainname域名域名其实就是入网计算机的名字,它的作用就象寄信需要写明人们的名字、地址相同重要。

网络安全专业词汇大全

网络安全专业词汇大全

网络安全专业词汇大全网络安全(Network Security)是指对网络系统和网络数据进行保护的一系列措施和技术。

随着网络技术的发展,网络安全问题日益突出,因此了解和掌握网络安全专业词汇对于网络安全从业人员以及广大网络用户来说至关重要。

本文将为您详细介绍一些常用的网络安全专业词汇。

1. 防火墙(Firewall):是一种在计算机网络之间起到过滤作用的设备或软件。

它可以根据预设的安全策略,对网络流量进行检查与过滤,保护企业网络免受恶意攻击和非法入侵。

2. 漏洞(Vulnerability):指计算机系统、软件或网络中存在的弱点或缺陷。

黑客可以利用这些弱点进行攻击,因此漏洞的发现和修补是网络安全的重要工作。

3. 加密(Encryption):是网络通信中的一项常用技术,通过将明文转换为密文,从而保护数据的机密性,防止数据在传输过程中被窃取、篡改或伪造。

4. 身份验证(Authentication):用于确认用户的身份是否合法的过程。

常见的身份验证方法包括用户名和密码、指纹识别、虹膜识别等。

5. 木马(Trojan):指一种伪装成有用或无害程序的恶意软件,一旦被执行,就会对计算机系统进行破坏、篡改或窃取信息等操作。

6. 病毒(Virus):是一种通过植入到合法程序中产生破坏、传播或窃取信息的恶意软件。

病毒可以通过网络传播,感染其他计算机系统。

7. 密码破解(Password Cracking):指通过暴力破解或其他手段,尝试获取他人密码的行为。

密码破解是黑客攻击中常用的手段之一。

8. 拒绝服务攻击(Denial of Service, DoS):是一种通过消耗目标系统资源,使其无法正常提供服务的攻击行为。

常见的拒绝服务攻击包括UDP Flood、SYN Flood等。

9. 入侵检测系统(Intrusion Detection System, IDS):用于监测和识别网络系统中的异常或非法行为。

IDS可以及时发现入侵行为,保障系统的安全性。

信息技术常用术语中英文对照表

信息技术常用术语中英文对照表

信息技术常用术语中英文对照表1. 互联网 (Internet)2. 网络安全 (Cybersecurity)3. 云计算 (Cloud Computing)5. 大数据 (Big Data)6. 机器学习 (Machine Learning)7. 物联网 (Internet of Things)8. 虚拟现实 (Virtual Reality)9. 增强现实 (Augmented Reality)10. 数字化转型 (Digital Transformation)11. 数据挖掘 (Data Mining)12. 信息安全 (Information Security)13. 信息技术 (Information Technology)15. 服务器 (Server)16. 客户端 (Client)17. 网络协议 (Network Protocol)18. 软件开发 (Software Development)19. 数据库 (Database)20. 编程语言 (Programming Language)21. 操作系统 (Operating System)22. 硬件 (Hardware)23. 软件 (Software)24. 网络基础设施 (Network Infrastructure)26. 数字营销 (Digital Marketing)27. 网络攻击 (Cyber Attack)28. 数据加密 (Data Encryption)29. 信息架构 (Information Architecture)30. 网络安全漏洞 (Cybersecurity Vulnerability)31. 信息系统 (Information System)32. 网络安全策略 (Cybersecurity Strategy)33. 网络安全意识 (Cybersecurity Awareness)34. 数字化战略 (Digital Strategy)35. 网络安全法规 (Cybersecurity Regulation)36. 信息安全标准 (Information Security Standard)37. 网络安全解决方案 (Cybersecurity Solution)38. 网络安全威胁 (Cybersecurity Threat)39. 信息安全事件 (Information Security Incident)40. 网络安全审计 (Cybersecurity Audit)41. 信息安全风险管理 (Information Security Risk Management)42. 网络安全监控 (Cybersecurity Monitoring)43. 信息安全培训 (Information Security Training)44. 网络安全事件响应 (Cybersecurity Incident Response)45. 信息安全政策 (Information Security Policy)46. 网络安全评估 (Cybersecurity Assessment)47. 信息安全意识提升 (Information Security Awareness)48. 网络安全培训 (Cybersecurity Training)49. 信息安全策略 (Information Security Strategy)50. 网络安全管理体系 (Cybersecurity Management System)信息技术常用术语中英文对照表51. 网络服务 (Network Service)52. 数据传输 (Data Transmission)53. 信息架构 (Information Architecture)54. 信息安全审计 (Information Security Audit)55. 信息安全认证 (Information Security Certification)56. 信息安全管理体系 (Information Security Management System)57. 信息安全策略 (Information Security Strategy)58. 信息安全培训 (Information Security Training)59. 信息安全意识 (Information Security Awareness)60. 信息安全风险管理 (Information Security Risk Management)61. 信息安全事件 (Information Security Incident)62. 信息安全标准 (Information Security Standard)63. 信息安全法规 (Information Security Regulation)64. 信息安全解决方案 (Information Security Solution)65. 信息安全威胁 (Information Security Threat)66. 信息安全监控 (Information Security Monitoring)67. 信息安全评估 (Information Security Assessment)68. 信息安全政策 (Information Security Policy)69. 信息安全审计 (Information Security Audit)70. 信息安全认证 (Information Security Certification)71. 信息安全管理体系 (Information Security Management System)72. 信息安全策略 (Information Security Strategy)73. 信息安全培训 (Information Security Training)74. 信息安全意识 (Information Security Awareness)75. 信息安全风险管理 (Information Security Risk Management)76. 信息安全事件 (Information Security Incident)77. 信息安全标准 (Information Security Standard)78. 信息安全法规 (Information Security Regulation)79. 信息安全解决方案 (Information Security Solution)80. 信息安全威胁 (Information Security Threat)81. 信息安全监控 (Information Security Monitoring)82. 信息安全评估 (Information Security Assessment)83. 信息安全政策 (Information Security Policy)84. 信息安全审计 (Information Security Audit)85. 信息安全认证 (Information Security Certification). 信息安全管理体系 (Information Security Management System)87. 信息安全策略 (Information Security Strategy)88. 信息安全培训 (Information Security Training)89. 信息安全意识 (Information Security Awareness)Management)91. 信息安全事件 (Information Security Incident)92. 信息安全标准 (Information Security Standard)93. 信息安全法规 (Information Security Regulation)94. 信息安全解决方案 (Information Security Solution)95. 信息安全威胁 (Information Security Threat)96. 信息安全监控 (Information Security Monitoring)97. 信息安全评估 (Information Security Assessment)98. 信息安全政策 (Information Security Policy)99. 信息安全审计 (Information Security Audit)100. 信息安全认证 (Information Security Certification)信息技术常用术语中英文对照表51. 网络服务 (Network Service)52. 数据传输 (Data Transmission)53. 信息架构 (Information Architecture)54. 信息安全审计 (Information Security Audit)55. 信息安全认证 (Information Security Certification)56. 信息安全管理体系 (Information Security Management System)57. 信息安全策略 (Information Security Strategy)58. 信息安全培训 (Information Security Training)59. 信息安全意识 (Information Security Awareness)Management)61. 信息安全事件 (Information Security Incident)62. 信息安全标准 (Information Security Standard)63. 信息安全法规 (Information Security Regulation)64. 信息安全解决方案 (Information Security Solution)65. 信息安全威胁 (Information Security Threat)66. 信息安全监控 (Information Security Monitoring)67. 信息安全评估 (Information Security Assessment)68. 信息安全政策 (Information Security Policy)69. 信息安全审计 (Information Security Audit)70. 信息安全认证 (Information Security Certification)71. 信息安全管理体系 (Information Security Management System)72. 信息安全策略 (Information Security Strategy)73. 信息安全培训 (Information Security Training)74. 信息安全意识 (Information Security Awareness)75. 信息安全风险管理 (Information Security Risk Management)76. 信息安全事件 (Information Security Incident)77. 信息安全标准 (Information Security Standard)78. 信息安全法规 (Information Security Regulation)79. 信息安全解决方案 (Information Security Solution)80. 信息安全威胁 (Information Security Threat)81. 信息安全监控 (Information Security Monitoring)82. 信息安全评估 (Information Security Assessment)83. 信息安全政策 (Information Security Policy)84. 信息安全审计 (Information Security Audit)85. 信息安全认证 (Information Security Certification). 信息安全管理体系 (Information Security Management System)87. 信息安全策略 (Information Security Strategy)88. 信息安全培训 (Information Security Training)89. 信息安全意识 (Information Security Awareness)90. 信息安全风险管理 (Information Security Risk Management)91. 信息安全事件 (Information Security Incident)92. 信息安全标准 (Information Security Standard)93. 信息安全法规 (Information Security Regulation)94. 信息安全解决方案 (Information Security Solution)95. 信息安全威胁 (Information Security Threat)96. 信息安全监控 (Information Security Monitoring)97. 信息安全评估 (Information Security Assessment)98. 信息安全政策 (Information Security Policy)99. 信息安全审计 (Information Security Audit)100. 信息安全认证 (Information Security Certification) 101. 数据库管理系统 (Database Management System)102. 编程语言 (Programming Language)103. 硬件 (Hardware)104. 软件 (Software)105. 操作系统 (Operating System) 106. 服务器 (Server)107. 客户端 (Client)108. 网络协议 (Network Protocol) 109. 软件开发 (Software Development) 110. 数据库 (Database)111. 编程语言 (Programming Language) 112. 操作系统 (Operating System) 113. 硬件 (Hardware)114. 软件 (Software)115. 服务器 (Server)116. 客户端 (Client)117. 网络协议 (Network Protocol) 118. 软件开发 (Software Development) 119. 数据库 (Database)120. 编程语言 (Programming Language) 121. 操作系统 (Operating System) 122. 硬件 (Hardware)123. 软件 (Software)124. 服务器 (Server)125. 客户端 (Client)126. 网络协议 (Network Protocol)127. 软件开发 (Software Development) 128. 数据库 (Database)129. 编程语言 (Programming Language) 130. 操作系统 (Operating System) 131. 硬件 (Hardware)132. 软件 (Software)133. 服务器 (Server)134. 客户端 (Client)135. 网络协议 (Network Protocol) 136. 软件开发 (Software Development) 137. 数据库 (Database)138. 编程语言 (Programming Language) 139. 操作系统 (Operating System) 140. 硬件 (Hardware)141. 软件 (Software)142. 服务器 (Server)143. 客户端 (Client)144. 网络协议 (Network Protocol) 145. 软件开发 (Software Development) 146. 数据库 (Database)147. 编程语言 (Programming Language) 148. 操作系统 (Operating System) 149. 硬件 (Hardware)150. 软件 (Software)。

网络安全英语例句带翻译

网络安全英语例句带翻译

网络安全英语例句带翻译1. Cybersecurity is of paramount importance in today's digital age, as cyber threats continue to evolve and become more sophisticated. (网络安全在当今数字时代至关重要,因为网络威胁不断演变并变得更加复杂。

)2. It is crucial for individuals and organizations to be vigilant against cyber attacks, such as phishing scams and malware infections. (个人和组织必须警惕网络攻击,如钓鱼诈骗和恶意软件感染。

)3. The unauthorized access to confidential information can have significant consequences, including financial loss, reputational damage, and legal liabilities. (未经授权访问机密信息可能导致重大后果,包括财务损失、声誉损害和法律责任。

)4. Strong passwords are one of the basic measures to protect against unauthorized access, and regular password changes are recommended to enhance security. (强密码是防止未经授权访问的基本措施之一,建议定期更改密码以增强安全性。

)5. Firewalls and antivirus software are essential tools in defending against malicious software and preventing unauthorized network access. (防火墙和防病毒软件是防御恶意软件和防止未授权网络访问的必备工具。

互联网安全英语词汇大全守护个人隐私与信息安全

互联网安全英语词汇大全守护个人隐私与信息安全

互联网安全英语词汇大全守护个人隐私与信息安全随着互联网的快速发展,越来越多的人开始关注个人隐私和信息安全。

保护个人隐私已经成为当今社会中一个重要的问题。

为了更好地理解互联网安全,我们需要了解相关的英语词汇。

本文将为大家提供一份互联网安全英语词汇大全,帮助大家更好地守护个人隐私和信息安全。

一、网络安全基础知识1. Information security 信息安全2. Data breach 数据泄露3. Cyber attack 网络攻击4. Malware 恶意软件5. Phishing 钓鱼网站6. Firewall 防火墙7. Encryption 加密8. Two-factor authentication 双因素认证9. Password security 密码安全10. Vulnerability 漏洞以上是一些基本的网络安全词汇,了解这些词汇将有助于我们更好地防范网络攻击,保护个人信息的安全。

二、个人隐私保护1. Privacy policy 隐私政策2. Consent 同意3. Data protection 数据保护4. Personally identifiable information (PII) 可识别个人信息5. Cookie 饼干(网络词义中指浏览器中的小型文件)6. Anonymity 匿名性7. Opt-out 选择退出8. Do Not Track (DNT) 不追踪在互联网上,个人隐私受到威胁。

了解这些词汇将帮助我们更好地保护个人隐私,避免个人信息被滥用。

三、社交媒体安全1. Social engineering 社交工程2. Online harassment 网络骚扰3. Cyberbullying 网络欺凌4. Identity theft 身份盗窃5. Geo-tagging 地理标记6. Privacy settings 隐私设置7. Security question 安全问题社交媒体的普及使得我们必须更加关注个人信息的安全。

网络安全英语怎么说

网络安全英语怎么说

网络安全英语怎么说网络安全是指网络系统的硬件、软件及其系统中的数据受到保护,不因偶然的或者恶意的原因而遭受到破坏、更改、泄露,系统连续可靠正常地运行,网络服务不中断。

那么你知道网络安全用英语怎么说吗?下面跟着一起来学习一下吧。

网络安全的英语说法1:]network security网络安全的英语说法2:cyber security网络安全相关英语表达:系统网络安全协会SANS Institute通信和网络安全Telecommunications and Network Security网络安全产品network safety products网络安全的英语例句:1. At last It'summarizes and expects E - Government network security system.最后对电子政务网络安全进行总结和展望.2. The first chapter summarize the network, networked instruments and network switch.第一章概述了网络数据的隔离与网络安全,并给出了几大典型应用.3. Other problems related to intranet security are also discussed.同时对涉及网络安全的有关问题进行了讨论.4. A firewall acts like a virtual security guard for your network.防火墙类似于一个虚拟的网络安全守卫.5. Rep: " It was a six - page letter on internet security. "销售人员: “是一封关于网络安全的6页长的信. ”6. An emergency response system is designed and its work mechanism is analyzed.构建了一个网络安全应急响应系统,并对系统的工作机制进行了分析.7. Lastly, elementary fulfillment of NSMS also explained this essay.最后, 本文给出了网络安全监控系统的初步实现.8. Other activities which harm the network are also prohibited.(五)其他危害计算机信息网络安全的.9. Its products cover anti - virus , network security andhacker protection.其产品覆盖反病毒, 网络安全和黑客防卫.10. The network security includes firewall, intrusion detection and hole scanning etc.网络安全技术有:防火墙、入侵检测和漏洞扫描等.11. But when we rejoice about it's expediency, the network security come closely.然而就在人们为之欣喜的同时, 网络安全问题接踵而至.12. Email filter is a very important subject in network security.邮件过滤是当前网络安全中比较重要的一个学科.13. The technique of Sniffer Discovery is a hard problem in network security.嗅探器发现技术是网络安全中重要问题.14. Data encryption is one of the key technologies in network security.数据加密技术是实现网络安全的关键技术之一.15. Introducing Intranet security resolvent's goal, principia, constitutes and keystone.提出网络安全设计的目标、原则、组成部分及侧重点.。

英汉网络安全词典

英汉网络安全词典

英汉网络安全词典英汉网络安全词典1. antivirus software / 杀毒软件Antivirus software, also known as anti-malware software, is a program designed to detect, prevent and remove malicious software from a computer or network.2. firewall / 防火墙A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It helps protect a computer or network from unauthorized access and potential threats.3. encryption / 加密Encryption is the process of converting plain text or data into an unreadable format using an algorithm and a key. It helps protect sensitive information and ensures secure communication.4. phishing / 钓鱼Phishing is a fraudulent practice where cybercriminals try to trick individuals into revealing sensitive information, such as passwords or credit card numbers, by pretending to be a legitimate entity.5. malware / 恶意软件Malware, short for malicious software, is any software designed to cause damage, disrupt operations, or gain unauthorized access to a computer or network. Common types of malware include viruses, worms, trojans, and ransomware.6. vulnerability / 漏洞A vulnerability is a weakness or flaw in a computer system or network that can be exploited by attackers. It can result in unauthorized access, data breaches, or system disruptions.7. authentication / 身份验证Authentication is the process of verifying the identity of an individual or device accessing a computer system or network. It can involve passwords, biometrics, or other means to ensure the authorized user's identity.8. intrusion detection system (IDS) / 入侵检测系统An intrusion detection system is a network security technology that monitors network traffic for malicious activity or unauthorized access. It alerts administrators or automatically takes action to prevent further damage.9. encryption key / 加密密钥An encryption key is a piece of information used in encryption algorithms to convert plain text into cipher text or vice versa. The key is necessary to decrypt the encrypted data and ensure secure communication.10. cybersecurity / 网络安全Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, damage, or theft. It involves implementing measures to prevent, detect, and respond to cyber threats.11. two-factor authentication (2FA) / 双因素身份验证Two-factor authentication is a security process that requires two different forms of identification before granting access to a computer system or network. It typically involves something the user knows (password) and something the user possesses (security token or mobile device).12. data breach / 数据泄露A data breach is an incident where unauthorized individuals gain access to protected or sensitive data without permission. It can result in the exposure or theft of personal information, financial records, or other confidential data.13. cyber attack / 网络攻击A cyber attack is an intentional act to compromise computer systems, networks, or devices by exploiting vulnerabilities. It can involve stealing sensitive data, disrupting operations, or causing damage to digital infrastructure.14. vulnerability assessment / 漏洞评估A vulnerability assessment is the process of identifying and evaluating vulnerabilities in a computer system, network, or application. It helps organizations understand their security weaknesses and take appropriate measures to mitigate risks.15. secure socket layer (SSL) / 安全套接字层Secure Socket Layer is a cryptographic protocol that ensures secure communication over a computer network. It provides encryption, authentication, and integrity, making it widely used for securing online transactions and data transfer.以上是英汉网络安全词典的部分词汇,以供参考。

网络安全英语怎么说

网络安全英语怎么说

网络安全英语怎么说随着互联网的发展和普及,网络安全问题越来越受到人们的关注。

了解网络安全英语的表达方式,对于掌握相关知识和交流沟通都具有重要意义。

本文将介绍几种常用的网络安全英语表达方式,帮助读者更好地理解和运用。

一、常用网络安全英语词汇1. Network security 网络安全2. Cybersecurity 网络安全3. Firewall 防火墙4. Malware 恶意软件5. Virus 病毒6. Phishing 钓鱼网站7. Hacking 黑客攻击8. Data breach 数据泄漏9. Password 密码10. Encryption 加密11. Authentication 认证二、网络安全英语常用表达1. Protect personal information 保护个人信息In order to maintain network security, it is important to protect personal information such as passwords, bank account details, and home addresses.2. Install antivirus software 安装反病毒软件To prevent malware and viruses from infecting your computer, it is recommended to install reliable antivirus software and regularly update it.3. Be cautious about phishing emails 注意钓鱼邮件Phishing emails are designed to trick users into revealing personal information. It is important to be cautious and not click on suspicious links or provide sensitive information in response to such emails.4. Use strong passwords 使用强密码A strong password contains a combination of letters, numbers, and symbols. It is advisable to use different passwords for different online accounts and change them regularly to enhance security.5. Keep software up to date 保持软件更新Software updates often include security patches and bug fixes. It is crucial to regularly update operating systems, web browsers, and other software to protect against potential vulnerabilities.6. Enable two-factor authentication 启用双重身份认证Two-factor authentication adds an extra layer of security by requiring users to provide two forms of identification, such as a password and a unique verification code sent to their mobile device.7. Regularly backup data 定期备份数据In case of a data breach or system failure, regularly backing up important files and data is essential to prevent loss and ensure quick recovery.三、网络安全英语扩展阅读除了基本的网络安全英语词汇和常用表达,了解一些扩展阅读内容也有助于进一步提升网络安全意识和英语表达能力。

网络安全相关中英文词汇

网络安全相关中英文词汇

网络安全相关中英文词汇英文中文意思序号1Access Control List(ACL)访问控制列表2access token 访问令牌3account lockout 账号封锁4account policies 记账策略5accounts 账号地址解析协议6Address Resolution Protocol(ARP)7Administrator account 管理员账号8attack 攻击9auditing 审计、监察10authentication 认证、鉴别11authorization 授权12back-end 后端13back up 备份14border 边界15border gateway 边界网关16bottleneck 瓶颈17breakable 可攻破的18breach 攻破、违反19bridge 网桥、桥接器20CGI-based attack 基于CGI攻击(利用公共网关接口的脆弱点进行攻击)21cipher 密码22ciphertext 密文23cleartext 明文24crack 闯入25crash 崩溃26cryptanalysis 密码分析27default route 缺省路由28data-driven attack 数据驱动攻击(依靠隐藏或者封装数据进行的攻击,那些数据可不补察觉地通过防火墙)29decryption 解密30denial of service(DoS)拒绝服务31dictionary attack 字典式攻击32disk mirroring 磁盘镜像33distributed file system 分布式文件系统34DNS 域名解析服务器35DNS spoofing 域名服务器电子欺骗36eavesdropping 窃听、窃取37encryption 加密38encrypted tunnel 加密通道39Ethernet 以太网40external security 外部安全性41firewall 防火墙42filter 过滤器43flooding 淹没44FTP(File Transfer Protocol)文件传送协议45gateway 网关46global account 全局账号47global group 全局组48group 组49group account 组账号50group identifier 组识别符51impersonation attack 伪装攻击52internal security 内部安全性53intranet 内联网、企业内部网54intruder 入侵者网际控制报文协议55ICMP(Internet ControlMessage Protocol)56IGMP(Internet GroupInternet群组管理协议Management Protocol)57IP masquerade IP伪装58IP spoofing IP欺骗59jack in 黑客常用的口语,意思为破坏服务器安全的行为60keys 密钥61keyspace 密钥空间62 Keystroke Recorder 按键记录器,用于窃取他人用户名和密码的工具63Local security 局部安全性64log 日志、记录65logging 登录66logoff 退出、注销67logon 注册68logon script 登录脚本69logic bomb 逻辑炸弹,一种可导致系统加锁或者故障的程序或代码70MPR 多协议路由器71multiprocessing 多重处理72multihomed host 多穴主机73Network Monitor 网络监控程序74network security 网络安全75network user 网络用户76node 节点77OSPF 开放最短路径优先协议78out-of-band attack 带外攻击79packet filter 分组过滤器80password 口令81payload 净负荷82permission 权限83plaintext 明文84PPP 点到点协议85PPTP 点到点隧道协议86priority 优先权87proxy 代理88proxy server 代理服务器89paseudorandom 伪随机90Remote boot 远程引导91router 路由器92RIP 路由选择信息协议93routing table 路由表94R.U.P 路由更新协议95RSA 一种公钥加密算法96script 脚本97SSL 安全套接层98secure 密码99SID 安全标识符100share-level security 共享级安全性101SNMP 简单网络管理协议102sniffer 嗅探器103snooping 探听104standalone server 独立服务器105strong cipher 强密码106stream cipher 流密码107strong password 强口令108time bomb 时间炸弹109TCPDUMP 是UNIX中捕获数据包的实用工具,常被用于获得详细的网络通信记录的。

有哪些网络安全口号英语

有哪些网络安全口号英语

有哪些网络安全口号英语1. "Protect your digital footprint, stay safe online."2. "Think before you click, cyber safety starts with you."3. "Lock it up, password protect your devices."4. "Beware of phishing scams, protect your personal information."5. "Don't be an easy target, update your software regularly."6. "Secure your network, use strong and unique passwords."7. "Keep your data backup, always be prepared for the worst."8. "Think twice before sharing, protect your privacy."9. "Be cautious with public Wi-Fi, it may not be secure."10. "Don't trust easily, verify before sharing personal information."11. "Report suspicious activity, help keep cyberspace clean."12. "Secure your accounts, enable two-factor authentication."13. "Backup regularly, recover quickly."14. "Practice safe browsing, avoid suspicious websites."15. "Guard your emails, don't open or click on suspicious links."16. "Stay informed, educate yourself about cyber threats."17. "Keep your devices updated, bugs and vulnerabilities can be fixed."18. "Be proactive, protect your digital identity."19. "Use reputable antivirus software, defend against malware."20. "Think like a hacker, stay one step ahead of cyber threats."21. "Stay vigilant, don't fall for social engineering tricks."22. "Teach your children about online safety, protect their innocence."23. "Don't overshare on social media, protect your personal information."24. "Don't ignore security warnings, they are there for a reason."25. "Backup your data, it's your second line of defense."26. "Don't use public computers for sensitive activities, protect your data."27. "Secure your home Wi-Fi, don't let others piggyback on your network."28. "Be mindful of your online presence, it reflects your offline character."29. "Stay updated with security news, knowledge is power in the digital world."30. "Protect your online reputation, think before you post."31. "Don't fall for scams, if it sounds too good to be true, it probably is."32. "Don't reuse passwords, use a unique one for each account."33. "Don't trust easily, verify the credibility of websites and emails."34. "Be cautious of suspicious attachments, they could contain malware."35. "Backup your important files regularly, don't risk losing them."36. "Secure your mobile devices, they hold valuable personal information."37. "Don't download pirated software, it may come bundled with malware."38. "Use firewalls and antivirus software, they provide an extra layer of protection."39. "Protect your online transactions, use trusted and secure payment methods."40. "Be mindful of what you share on social media, it can be used against you."41. "Delete unused accounts, minimize your exposure to potential threats."42. "Don't share sensitive information over unencrypted Wi-Fi networks."43. "Regularly review your privacy settings on social media platforms."44. "Educate your employees about cyber threats, they are your first line of defense."45. "Secure your email communications, use encrypted email services if possible."46. "Don't fall for fake tech support calls, verify the legitimacy of the caller."47. "Secure your smart home devices, they can be vulnerable to cyber attacks."48. "Don't neglect physical security, lock your devices when not in use."49. "Be wary of suspicious links on social media, they may lead to malware."50. "Stay informed about the latest security trends, knowledge is key in cyber defense."。

根据网络安全常用术语中英文对照表,给出10个例子。

根据网络安全常用术语中英文对照表,给出10个例子。

根据网络安全常用术语中英文对照表,给出10个例子。

根据网络安全常用术语中英文对照表,给出10个例子1. 电子邮件 [Email]: 一种通过计算机网络发送和接收的电子信息交流工具。

2. 防火墙 [Firewall]: 一种用于保护计算机和网络免受未经授权访问和恶意攻击的安全设备。

3. 病毒 [Virus]: 一种恶意软件,能够在计算机系统中自我复制并传播,对系统造成破坏。

4. 加密 [Encryption]: 通过使用一种密钥将数据转换成不可读的形式,以保护数据的安全性和完整性。

5. 身份认证 [Authentication]: 验证用户的身份以确保其访问计算机系统或网络的权限。

6. 钓鱼 [Phishing]: 一种网络欺诈手段,通过伪装成合法机构或个人,诱骗用户提供敏感信息。

7. 漏洞 [Vulnerability]: 计算机系统或软件中存在的弱点,可能被黑客利用进行攻击。

8. 双因素认证 [Two-factor Authentication]: 在身份认证过程中要求用户提供两种不同的身份验证要素,增强安全性。

9. 黑客 [Hacker]: 通常指研究计算机系统安全性的专家,也可指恶意攻击计算机系统的人。

10. 非授权访问 [Unauthorized Access]: 未经允许或未经授权的个人或实体试图访问计算机系统或网络。

以上是根据网络安全常用术语中英文对照表给出的10个例子。

这些术语在网络安全领域中广泛使用,了解这些术语有助于提高对网络安全的认识和保护个人信息的能力。

建议在使用时注意保护个人计算机和网络设备的安全性,并时刻关注网络安全最新动态,以保护自己免受潜在的网络威胁。

网络安全相关中英文词汇

网络安全相关中英文词汇
TCPDUMP
是UNIX中捕获数据包的实用工具,常被用于获得详细的网络通信记录的。
110
TCP/IP
传输控制协议/网际协议
111
Traceroute
应用程序名,用于跟踪本机和远程主机之间的路由
112
Trojan Horse
特洛伊木马
113
trust
信任
114
tunnel
安全加密链路,隧道
115
vector of attack
62
Keystroke Recorder
按键记录器,用于窃取他人用户名和密码的工具
63
Local security
局部安全性
64
log
日志、记录
65
logging
登录
66
logoff
退出、注销
67
logon
注册
68
logon script
登录脚本
69
logic bomb
逻辑炸弹,一种可导致系统加锁或者故障的程序或代码
网际控制报文协议
56
IGMP(Internet Group Management Protocol)
Internet群组管理协议
57
IP masquerade
IP伪装
58
IP spoofing
IP欺骗
59
jack in
黑客常用的口语,意思为破坏服务器安全的行为
60
keys
密钥
61
keyspace
密钥空间
地址解析协议
7
Administrator account
管理员账号
8
attack

5.Network Security 网络安全(新)

5.Network Security 网络安全(新)

work Security 网络安全1.As more Americans do more things online, Internet identity【. 身份;[逻]同一性;个性;[数]恒等(式)】 theft【n. 偷盗,偷窃;被盗,失窃;盗窃之物,赃物;失窃案例】 is a growing—and very costly【adj. 昂贵的;代价高的】—problem. Consider the following ten aspects【n. 方面( aspect的名词复数 );面貌;方位;样子】 and learn the best ways to protect yourself.1、随着美国网民不断增多,互联网使用越来越频繁,互联网身份失窃成了一个日益严重且代价昂贵的问题。

阅读以下十条建议,学会保护自己隐私的最佳方式。

2. Guard Your Personal Information. Never respond to requests for personal or account information online (or over the phone). When your social security number is requested as an identifier, ask if you can provide【vt.& vi. 提供,供给,供应;vt. 规定;提供(+for);装备;预备;vi. 抚养,赡养(+for);做准备;预约(for 或 against) 】 alternate【adj. 轮流的;交替的;间隔的;代替的;vi. 交替;轮流;vt. 使交替;使轮流;n. 〈美〉(委员)代理人;候补者;替换物】information. Watch out for convincing【adj. 令人相信的;有说服力的;令人心悦诚服的;v. 使相信(convince的现在分词);使明白;使确信;说服】imitations【n. 模仿,仿效;仿制品;赝品;[生]拟态;adj. 人造的;仿制的】of banks, card companies, charities【n. 慈爱( charity的名词复数 );救济金;慈善团体;宽厚】 and government agencies【n. 代理( agency的名词复数 );服务机构;(政府的)专门机构;代理(或经销)业务(或关系)】. Use legitimate【adj. 合法的,合理的;正规的;合法婚姻所生的;真正的,真实的;vt. 使合法;给予合法的地位;通过法律手段给(私生子)以合法地位;正式批准,授权】 sources【n. 根源,本源;源头,水源;原因;提供消息的人;vt. (从…)获得;发起;向…提供消息;寻求(尤指供货)的来源;vi. 原料来源;起源;寻求来源;寻求生产商(或提供商)】of contact【n. 接触;触点;[医](传染病)接触人;门路;vt. 使接触;与…联系;与…通讯(或通话);vi. 联系,接触】 information to verify【vt. 核实;证明;判定】 requests for information, such as your financial【adj. 财政的;财务的;财源的;财经家的】 institution's 【n. (大学、银行等规模大的)机构;惯例,制度,规定,建立;社会事业机构; <口>名人,名物】official 【n. 行政官员;公务员;[体]裁判;高级职员;adj. 官方的,法定的;公职的,公务的;官气十足;正式的】website【n. [通信]网站】 or the telephone number listed 【adj. 列出的;坏布边】on statements【n. 声明;(思想、观点、文章主题等的)表现;(文字)陈述;结算单;vi. (英国)对儿童进行特殊教育评估认定;vt. 申请(小孩)有特殊教育需要】.2、保护个人信息。

信息安全工程师英语词汇

信息安全工程师英语词汇

信息安全工程师英语词汇以下是一些信息安全工程师可能常用的英语词汇:1. Information Security(信息安全)2. Cybersecurity(网络安全)3. Hacker(黑客)4. Cracker(破解者)5. Virus(病毒)6. Spyware(间谍软件)7. Malware(恶意软件)8. Phishing(网络钓鱼)9. Social Engineering(社交工程)10. Zero Day Attack(零日攻击)11. Patch Management(补丁管理)12. Firewall(防火墙)13. Antivirus Software(杀毒软件)14. Encryption(加密)15. Decryption(解密)16. Digital Certificate(数字证书)17. Public Key Infrastructure (PKI)(公钥基础设施)18. Two-Factor Authentication(双因素认证)19. Password Policy(密码策略)20. Security Audit(安全审计)21. Vulnerability Assessment(漏洞评估)22. Incident Response(事件响应)23. Data Privacy(数据隐私)24. Data Protection(数据保护)25. Compliance(合规性)26. ISO 27001(信息安全管理体系标准)27. NIST SP 800-53(美国国家安全标准)28. CMMI(能力成熟度模型集成)29. COBIT(IT治理框架)30. ITIL(IT服务管理框架)以上仅是一些常见的词汇,实际上信息安全领域的词汇非常广泛。

信息安全术语

信息安全术语

信息安全技术术语(中英文)1.0 Network Security 网络安全1.1 Implementsecurity configuration parameters on network devices and othertechnologies. 在网络设备和其他设备上实施安全配置参数Firewalls 防火墙Routers 路由器Switches 交换机Load Balancers 负载均衡Proxies 代理Web security gateways Web 安全网关VPN concentrators VPN 网关NIDS and NIPS 网络入侵检测与网络入侵防范* Behavior based 基于行为* Signature based 基于特征* Anomaly based 基于异常* Heuristic 启发式Protocol analyzers 协议分析仪Spam filter 垃圾邮件过滤UTM security appliances 统一威胁管理* URL filter URL 过滤* Content inspection 内容检查* Malware inspection 恶意软件检查Web application firewall vs. network firewallWeb 应用防火墙与网络防火墙Application aware devices 应用端设备* Firewalls 防火墙* IPS 入侵防御* IDS 入侵检测* Proxies 代理1.2 Given a scenario,use secure network administration principles. 给定一个场景,应用安全网络管理原则Rule-based management 基于规则的管理Firewallrules 防火墙规则VLAN ma nageme nt VLA 管理Secure router configuration 安全路由配置Access control lists 访问控制列表Port Security 端口安全802.1x 802.1xFlood guards 流量攻击防护Loop protection 环路保护Implicit deny 默认拒绝Network separation 网络隔离Log analysis 日志分析Unified Threat Management 统一威胁管理1.3 Explain networkdesign elements and components. 解释网络设计的元素和组件DMZ非军事化区DMZSubnetting 子网VLAN 虚拟局域网NAT 网络地址翻译Remote Access 远程接入Telephony 电话NAC网络接入控制NACVirtualization 虚拟化Cloud Computing 云计算* Platform as a Service 平台即服务* Software as a Service 软件即服务* Infrastructure as a Service 基础设施即服务* Private 私有云* Public 公有云* Hybrid 混合云* Community 社区Layered security / Defense in depth 分层安全/ 深度防御1.4 Given a scenario,implement common protocols and services. 给定一个场景,实施通用的协议和服务Protocols 协议* IPSec* SNMP* SSH* DNS* TLS* SSL* TCP/IP* FTPS* HTTPS* SCP* ICMP* IPv4* IPv6* iSCSI* Fibre Channel* FCoE* FTP* SFTP* TFTP* TELNET* HTTP* NetBIOSPorts 端口* 21* 22* 25* 53* 80* 110* 139* 143* 443* 3389OSI relevance OSI 相关1.5 Given a scenario,troubleshoot security issues related to wireless networking. 给定一个场景,对无线组网中的安全问题进行故障排查WPAWPA2WEPEAPPEAPLEAPMAC filter MAC 过滤Disable SSID broadcast 禁用SSID 广播TKIPCCMPAntenna PlacementPower level controlsCaptive portalsAntenna typesSite surveysVPN (over open wireless)2.0 Compliance and Operational Security 合规与运维安全2.1 Explain theimportance of risk related concepts. 解释风险相关概念的重要性Control types 控制类型* Technical 技术性* Management 管理性* Operational 操作性False positives 误报False negatives 漏报Importance of policies in reducing risk 风险降低策略的重要性* Privacy policy 隐私策略* Acceptable use 可接受使用* Security policy 安全策略* Mandatory vacations 强制度假* Job rotation 工作轮换* Separation of duties 职责分离* Least privilege 最小特权Risk calculation 风险计算* Likelihood 可能性* ALE 年度预期损失* Impact 影响* SLE 单次预期损失* ARO 年度发生率* MTTR 平均故障维修时间* MTTF 平均失效前时间* MTBF 平均故障间隔时间Quantitative vs. qualitative 定量vs. 定性Vulnerabilities 漏洞Threat vectors 威胁Probability / threat likelihood 可能性/ 威胁可能性Risk-avoidance, transference, acceptance,mitigation, deterrence 风险规避,转移,接受,降低,威慑Risks associated with Cloud Computing andVirtualization 云计算与虚拟化相关的风险Recovery time objective and recovery pointobjective 恢复时间目标与恢复点目标2.2 Summarize thesecurity implications of integrating systems and data with third parties. 总结与第三方集成系统与数据的安全含义On-boarding/off-boarding business partners 驻场/ 场外的业务合作伙伴Social media networks and/or applications 社交媒体网络与应用Interoperability agreements互操作协议* SLA 服务水平协议* BPA* MOU 备忘录* ISAPrivacy considerations 隐私考虑Risk awareness 风险意识Unauthorized data sharing 非授权数据共享Data ownership 数据所有权Data backups 数据备份Follow security policy and procedures 遵从安全策略与程序Review agreement requirements to verifycompliance and performance 审核协议需求来确认合规性与性能standards 标准2.3 Given a scenario,implement appropriate risk mitigation strategies. 给定一个场景,实施正确的风险降低策略Change man ageme nt 变更管理Incident management 事件管理User rights and permissions reviews 用户权限审核Perform routine audits 执行日常审计Enforce policies and procedures to prevent dataloss or theft 加强策略和程序来阻止数据的损失或失窃Enforce technology controls 加强技术控制* Data Loss Prevention (DLP) 数据防泄漏( DLP)2.4 Given a scenario,implement basic forensic procedures. 给定一个场景,实施基本的取证程序Order of volatility 波动的顺序Capture system image 获取系统镜像Network traffic and logs 网络流量与日志Capture video 获取视频录像Record time offset 记录时间偏离Take hashes 进行哈希校验Screenshots 截屏Witnesses 目击者Track man hours and expense 跟踪记录人员时间和花费Chain of custody 证据链Big Data analysis 大数据分析2.5 Summarize commonincident response procedures. 总结通用的事件响应程序Preparation 准备Incident identification 事件识别Escalation and notification 升级与通知Mitigation steps 缓解步骤Lessons learned 经验学习Reporting 汇报Recovery/reconstitution procedures 恢复/ 重建程序First responder 第一响应人Incident isolation 事件隔离* Quarantine 隔离区* Device removal 设备清除Data breach 数据泄露Damage and loss control 灾害与损失控制2.6 Explain theimportance of security related awareness and training. 解释安全相关意识和培训的重要性Security policy training and procedures 安全策略培训与程序Role-based training 基于角色的培训Personally identifiable information 个人可识别信息Information classification 信息分级* High 高* Medium 中* Low 低* Confidential 机密* Private 隐私* Public 工控Data labeling, handling anddisposal 数据标签、处理与废弃Compliance with laws, best practices andstandards 法律、最佳实践与标准的合规User habits 用户习惯* Password behaviors 密码行为* Data handling 数据处理* Clean desk policies 桌面清理策略* Prevent tailgating 防止尾随* Personally owned devices 个人拥有的设备New threats and new security trends/alerts 新威胁与新安全趋势/ 警告* New viruses 新病毒* Phishing attacks 钓鱼攻击* Zero-day exploits 零日攻击Use of social networking and P2P 社会工程和P2P的使用Follow up and gather training metrics tovalidate compliance and security 遵从并收集培训度量来验证合规与安全posture 态度2.7 Compare andcontrast physical security and environmental controls. 比较和对比物理安全环境控制Environmental controls 环境控制* HVAC 空调暖通* Fire suppression 灭火* EMI shielding 防电磁泄漏* Hot and cold aisles 冷热通道* Environmental monitoring 环境监控* Temperature and humidity controls温湿度控制Physical security 物理安全* Hardware locks 硬件锁* Mantraps 陷门(双重门)* Video Surveillance 视频监控* Fencing 篱笆* Proximity readers 接近探测* Access list 访问列表* Proper lighting 正确的照明* Signs 标记* Guards 门卫* Barricades 栅栏* Biometrics 生物识别* Protected distribution (cabling)分发保护(线缆)* Alarms 报警* Motion detection 活动探测Control types 控制类型* Deterrent 威慑性* Preventive 预防性* Detective 检测性* Compensating 补偿性* Technical 技术性* Administrative 管理性2.8 Summarize riskmanagement best practices. 总结风险管理的最佳实践Business continuity concepts 业务连续性概念* Business impact analysis 业务影响分析* Identification of critical systems and components 识别关键系统与组件* Removing single points of failure 消除单点故障* Business continuity planning and testing 业务连续性规划与测试* Risk assessment 风险评估* Continuity of operations 运维连续性* Disaster recovery 灾难恢复* IT contingency planning IT 连续性规划* Succession planning 接班人规划* High availability 高可用性* Redundancy 冗余* Tabletop exercises 桌面演练Fault tolerance 容错* Hardware 硬件* RAID RAID 磁盘阵列* Clustering 集群* Load balancing 负载均衡* Servers 服务器Disaster recovery concepts 灾难恢复概念* Backup plans/policies 备份计划/ 策略* Backup execution/frequency 备份执行/ 频率* Cold site 冷站* Hot site 热站* Warm site 温站2.9 Given a scenario,select the appropriate control to meet the goals of security. 给定一个场景,选择合适的控制来满足安全目标Confidentiality 机密性* Encryption 加密* Access controls 访问控制* Steganography 隐写术Integrity 完整性* Hashing 哈希* Digital signatures 数字签名* Certificates 证书* Non-repudiation 抗抵赖Availability 可用性* Redundancy 冗余* Fault tolerance 容错* Patching 补丁Safety 场所安全* Fencing 栅栏* Lighting 照明* Locks 门禁* CCTV 闭路电视* Escape plans 逃生计划* Drills 演练* Escape routes 逃生路径* Testing controls 测试控制重信息安全管理,对技术的涉及也不太深入,只有Security+ 认证才是技术人员专属的。

网络安全行业术语英文

网络安全行业术语英文

网络安全行业术语英文网络安全行业术语英文:1. Malware(恶意软件)- Abbreviation for malicious software, refers to any type of software that is designed with malicious intent, such as viruses, worms, Trojan horses, ransomware, spyware, etc.2. Firewall(防火墙)- A network security device that monitors incoming and outgoing network traffic based on predefined security rules, preventing unauthorized access to or from a private network.3. Encryption(加密)- The process of converting plain text into cipher text, making the information unreadable to anyone without the proper decryption key.4. Phishing(钓鱼)- A cyber attack where attackers try to deceive individuals into disclosing sensitive information, such as passwords or financial information, by posing as trustworthy entities in emails or websites.5. Two-factor authentication(双因素认证)- A security measure that requires users to provide two types of identification factors, such as a password and a biometric scan or a security token, to gain access to a system or account.6. Vulnerability(漏洞)- A weakness or flaw in a system or software that can be exploited by attackers to gain unauthorized access, manipulate data, or disrupt normal operation.7. Patch(补丁)- A software update or fix that is released by vendors to address known vulnerabilities or bugs in their software, aiming to improve security or functionality.8. Intrusion Detection System (IDS)(入侵检测系统)- A network security tool that monitors network traffic, identifies suspicious or potentially malicious activity, and alerts network administrators to potential intrusions.9. Denial of Service (DoS)(拒绝服务)- An attack where an attacker overwhelms a target system or network with a flood of malicious traffic, rendering it unable to respond to legitimate requests.10. Brute-force attack(暴力破解)- An attack method in which an attacker tries all possible combinations of passwords or encryption keys until the correct one is found.11. Antivirus software(防病毒软件)- A software program designed to detect, prevent, and remove computer viruses and other malware from infected systems or networks.12. Social engineering(社交工程)- A technique used by attackers to manipulate individuals into divulging sensitive information or performing certain actions through psychological manipulation, deception, or impersonation.13. Zero-day vulnerability(零日漏洞)- A security vulnerabilitythat is unknown to software vendors or the public, allowing attackers to exploit it before a patch or fix is released.14. Intrusion Prevention System (IPS)(入侵预防系统)- Similar to an IDS, an IPS also monitors network traffic, but it can take action to prevent or block suspicious or malicious activity from compromising the network.15. Penetration testing(渗透测试)- The process of evaluating the security of a system or network by simulating real-world attack scenarios to identify vulnerabilities, weaknesses, or potential entry points.16. Cybersecurity incident response(网络安全事件响应)- The process of handling and responding to a cybersecurity incident in a systematic and organized manner, including detecting, containing, eradicating, and recovering from the incident.17. Data breach(数据泄露)- An incident where unauthorized individuals gain access to sensitive or protected data, leading to potential misuse, theft, or exposure of the data.18. Secure socket layer (SSL)(安全套接层)- A cryptographic protocol used to establish secure, encrypted connections between a web server and a client, ensuring the confidentiality and integrity of the data transmission.19. Network segmentation(网络分割)- The practice of dividinga computer network into smaller subnetworks called "segments" toisolate traffic and limit the impact of potential security breaches.20. Identity and access management(身份和访问管理)- A framework or set of processes and technologies used to manage and control user identities, access rights, and permissions in a network or system.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
62
Keystroke Recorder
按键记录器,用于窃取他人用户名和密码的工具
63
Local security
局部安全性
64
log
日志、记录
65
logging
登录
66
logoff
退出、注销
67
logon
注册
68
logon script
登录脚本
69
logicห้องสมุดไป่ตู้bomb
逻辑炸弹,一种可导致系统加锁或者故障的程序或代码
地址解析协议
7
Administrator account
管理员账号
8
attack
攻击
9
auditing
审计、监察
10
authentication
认证、鉴别
11
authorization
授权
12
back-end
后端
13
back up
备份
14
border
边界
15
border gateway
边界网关
16
bottleneck

49
group account
组账号
50
group identifier
组识别符
51
impersonation attack
伪装攻击
52
internalsecurity
内部安全性
53
intranet
内联网、企业内部网
54
intruder
入侵者
55
ICMP(Internet Control Message Protocol)
网络安全相关中英文词汇
序号
英文
中文意思
1
Access Control List(ACL)
访问控制列表
2
access token
访问令牌
3
account lockout
账号封锁
4
account policies
记账策略
5
accounts
账号
6
Address Resolution Protocol(ARP)
攻击向量
116
vulnerability
脆弱性
117
weak password
弱口令
118
well-known ports
通用端口
以太网
40
external security
外部安全性
41
firewall
防火墙
42
filter
过滤器
43
flooding
淹没
44
FTP(File Transfer Protocol)
文件传送协议
45
gateway
网关
46
global account
全局账号
47
global group
全局组
48
group
带外攻击
79
packet filter
分组过滤器
80
password
口令
81
payload
净负荷
82
permission
权限
83
plaintext
明文
84
PPP
点到点协议
85
PPTP
点到点隧道协议
86
priority
优先权
87
proxy
代理
88
proxy server
代理服务器
89
paseudorandom
70
MPR
多协议路由器
71
multiprocessing
多重处理
72
multihomed host
多穴主机
73
Network Monitor
网络监控程序
74
network security
网络安全
75
network user
网络用户
76
node
节点
77
OSPF
开放最短路径优先协议
78
out-of-band attack
伪随机
90
Remote boot
远程引导
91
router
路由器
92
RIP
路由选择信息协议
93
routing table
路由表
94
R.U.P
路由更新协议
95
RSA
一种公钥加密算法
96
script
脚本
97
SSL
安全套接层
98
secure
密码
99
SID
安全标识符
100
share-level security
密码分析
27
default route
缺省路由
28
data-driven attack
数据驱动攻击(依靠隐藏或者封装数据进行的攻击,那些数据可不补察觉地通过防火墙)
29
decryption
解密
30
denial of service(DoS)
拒绝服务
31
dictionary attack
字典式攻击
32
共享级安全性
101
SNMP
简单网络管理协议
102
sniffer
嗅探器
103
snooping
探听
104
standalone server
独立服务器
105
strong cipher
强密码
106
stream cipher
流密码
107
strong password
强口令
108
time bomb
时间炸弹
109
网际控制报文协议
56
IGMP(Internet Group Management Protocol)
Internet群组管理协议
57
IP masquerade
IP伪装
58
IP spoofing
IP欺骗
59
jack in
黑客常用的口语,意思为破坏服务器安全的行为
60
keys
密钥
61
keyspace
密钥空间
TCPDUMP
是UNIX中捕获数据包的实用工具,常被用于获得详细的网络通信记录的。
110
TCP/IP
传输控制协议/网际协议
111
Traceroute
应用程序名,用于跟踪本机和远程主机之间的路由
112
Trojan Horse
特洛伊木马
113
trust
信任
114
tunnel
安全加密链路,隧道
115
vector of attack
瓶颈
17
breakable
可攻破的
18
breach
攻破、违反
19
bridge
网桥、桥接器
20
CGI-based attack
基于CGI攻击(利用公共网关接口的脆弱点进行攻击)
21
cipher
密码
22
ciphertext
密文
23
cleartext
明文
24
crack
闯入
25
crash
崩溃
26
cryptanalysis
disk mirroring
磁盘镜像
33
distributed file system
分布式文件系统
34
DNS
域名解析服务器
35
DNS spoofing
域名服务器电子欺骗
36
eavesdropping
窃听、窃取
37
encryption
加密
38
encrypted tunnel
加密通道
39
Ethernet
相关文档
最新文档