網上犯罪 的英文怎麼說
中文拼音 [wǎngshàngfànzuì]
網上犯罪
英文
cyber crime- 網 : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
- 上 : 上名詞[語言學] (指上聲) falling-rising tone
- 犯 : Ⅰ動詞1 (抵觸; 違犯) go against; offend; violate 2 (侵犯) attack; violate; work against 3 (發...
- 罪 : Ⅰ名詞1 (犯法的行為) crime; guilt 2 (過失) fault; misconduct; blame; wrongdoing 3 (苦難; 痛苦...
- 網上 : on-line shopping
- 犯罪 : commit a crime [an offense]: 犯罪的中止 desistance from offense; 犯罪和青少年犯罪 crime and delin...
-
Up to now, complete province keeps clear of lawfully on the net bawdy pornography information 55089, shut lawfully put the website that has bawdy pornography news 2114 the home, columns 384 ; uncover a network bawdy pornography violates guilty case 264 cases, among them, criminal case 111, case of public security administration 153, arrest illegal crime suspect 659
截至現在,全省依法清除網上淫穢色情信息55089條,依法關閉存有淫穢色情信息的網站2114家、欄目384個;破獲網路淫穢色情違法犯罪案件264起,其中,刑事案件111起,治安行政案件153起,抓獲違法犯罪嫌疑人659名。In special operation, jiangsu province was made clear " jiangsu of base oneself upon, face the whole nation, outside outspread condition " the fight is politic, to the clew of bawdy pornography crime that discovers on the net, no matter in churchyard open bawdy lubricious love net stands to still be outside the condition, hire network serves a space, organize picked troops strong will, check after all, destroy stoutly, eliminate a harm
在專項行動中,江蘇省明確了「立足江蘇,面向全國,延伸境外」的斗爭策略,對網上發現的淫穢色情犯罪線索,無論在境內開辦淫穢色情網站還是在境外租用網路服務空間,都組織精兵強將,一查到底,果斷打掉,消除危害。Tracing the proceeds of cybercrime
追查網上罪犯所得贓款Tracing the proceeds of cybercrime is often as much an exercise in dealing with the incongruous effects of the old and new economies as it is about chasing criminals
在追查網上罪犯所得贓款的過程中,調查人員不僅要追緝罪犯,更要處理新舊經濟模式不協調所帶來的影響。This study defines internet deviance / crime as internet behavior violates the law or social norms
摘要本研究定義網?偏差?為或犯罪為:在電腦網?上違反法?或道德規范的?為。Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis
網路取證是對現有網路安全體系的必要擴展,已日益成為研究的重點.但目前在進行網路取證時仍存在很多挑戰:如網路產生的海量數據;從已收集數據中提取的證據的可理解性;證據分析方法的有效性等.針對上述問題,利用模糊決策樹技術強大的學習能力及其分析結果的易理解性,開發了一種基於模糊決策樹的網路取證分析系統,以協助網路取證人員在網路環境下對計算機犯罪事件進行取證分析.給出了該方法的實驗結果以及與現有方法的對照分析結果.實驗結果表明,該系統可以對大多數網路事件進行識別(平均正確分類率為91 . 16 ? ) ,能為網路取證人員提供可理解的信息,協助取證人員進行快速高效的證據分析Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model
中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。Speech by the secretary for commerce, industry and technology, mr henry tang, at the information technology and intellectual property committees joint luncheon meeting of the american chamber of commerce in hong kong on january 9, 2003
刑事檢控專員江樂士資深大律師在美國華盛頓?舉行的國際檢察官聯合會第八屆年會關于跨國犯罪網路的全體會議上的致辭全文(八月十五日)As any new technological revolution brings us convenience and puzzle in ethics as well, network is not fierce floods and savage beasts, but it is a double scissors. lt has brought about positive influence but also inevitably some bad effects such as news spread unchecked, trash polluted, network addictation, hacker action even computer crime. how to promote the teenagers news techonology knowledge and take them moralty and intellect
就像任何新技術革命在給我們帶來便利的同時,也會給人類帶來倫理道德上的困惑一樣,網路不是洪水猛獸,但它卻是一把「雙刃劍」 。它在給青少年帶來積極影響的同時,也不可避免會造成一些負面效應如信息泛濫,垃圾污染,游戲網戀,網路上癮,黑客行為,乃至網路犯罪。Cyber scams are increasingly being committed by organised crime syndicates out to profit from sophisticated ruses rather than hackers keen to make an online name for themselves, according to a top u. s. official
據美國一高官稱,網路犯罪越來越呈現出有組織的集團犯罪,他們通過精密的策劃斂財,不象黑客們僅是急於在網路上一舉成名The concept of " cybercrime " differs from " computer crime ", its content could be divided into two categories : cybercrime in narrow sense ( i. e., crimes for computer network ) and cybercrime in broad sense ( i. e., crimes by computer network ), the former is basically consistent in the crime features of several crimes in present criminal law of china, the main problem is defining and resisting of cracker behavior
「網路犯罪」的提法與「計算機犯罪」有相同之處,也有重要的區別。對網路犯罪的內容,本文傾向于區分為對網路的犯罪和用網路實施的犯罪兩種。前者基本上與我國現行刑法規定的幾個罪名的犯罪構成相一致,這方面目前較主要的難題是對黑客行為的界定和處理。The acc cyber support unit acts as an interface between the organisation and the criminal use of technology. the unit includes cyber intelligence support, a cyber investigators training program, computer forensics capability, technical research and development, and providing advice to acc management and staff on cybercrime issues
滅罪委員會轄下的數碼科技支援小組,專責對付利用先進科技進行的犯罪活動,其職責包括提供網上罪行情報支援、舉辦網上罪行調查人員訓練課程、提供電腦資料鑒證服務,進行技術研究與開發,以及就網上犯罪的有關問題向滅罪委員會管職雙方提供意見。The apparent surge in internet crime in the new millennium as suggested by the top graph has degraded the usefulness of the net as a marketplace for goods
如上圖所示,由於網路犯罪在邁入千禧年後明顯遽增,因而降低了網路做為商品交易市場的功能。Mr mcleod was also in hong kong to present at the 2nd asia cybercrime summit on the acc s role in investigating cybercrime and the newly formed australian hi tech crime centre ahtcc
麥樂德在香港出席第二屆亞洲網上罪行高峰會時,向與會者介紹滅罪委員會在調查網上犯罪所扮演的角色,以及新成立的澳洲高科技犯罪研究中心的工作。Aside from the added ease and convenience that the virtual world affords global criminals, they were doubly aided by the investigatory process being firmly tied to the physical restrictions of old economy laws
由於網上犯罪容易而且方便,再加上舊式經濟法律使調查工作受到諸多制肘,令國際罪犯有機可乘。Technology crimes refer to crimes targeted at computers or computer systems ( such as unauthorised access to servers or defacement of websites ) and crimes committed via the internet ( such as online gambling ). thus, most of the crimes arising from online games could be categorised as technology crimes
(一)科技罪案指直接以電腦或電腦系統為目標的罪行(例如非法闖入伺服器或損毀網頁) ,以及使用網際網路犯罪的罪行(例如網上賭博) ,因此網上游戲引發的罪行大部分可歸類為科技罪案。An olympic information security system must be established to guarantee the network and information security of the games, guard against cyber crimes such as hacking and ensure the stable operation of all kinds of information systems
建成奧運信息安全體系,確保奧運網路和信息的安全,防範黑客攻擊等網上犯罪行為,確保各類信息系統的穩定運行。To check the network crime, the author put forward proposal of lowering age for penalty and increasing unit crime in the light of that which tendency of low age is more apparent and unit crime arise too many, introducing strict liability in view of that which intentional or disintentional network crime is discriminated difficultly. to meet preventive needs, criminal law should alter result crime to dangerous or behaviour crime. because objective essentialia negotii of network crime is distinct from traditional crime, criminal law should replenish two criminal articals : crime of stealing computer network ; crime of providing computer network
該部分提出了應對網路犯罪的一系列刑法對策,針對網路犯罪主體的低齡化趨勢明顯和單位犯罪大量出現的問題,提出了就網路犯罪要陽氏相對負刑事責任年齡和增設單位網路犯罪的主張;針對網路犯罪罪過的過失與故意的難辯性,提出要引進嚴格責任的歸責原則;對客觀要件上的特殊哇,主張前置打擊力度,將網路犯罪由結果犯設置為危險犯或者行為犯;最後在客體要件上,依據客體侵犯的是復雜j客體,提出要增加竊用計算機網路服務罪和提供計算機網路犯罪等罪名。Christopher painter, deputy chief of the computer crimes and intellectual property section at the department of justice, said there had been a distinct shift in recent years in the type of cyber criminals that online detectives now encounter
法務部網路犯罪及知識產權主席說,最近幾年,關于網路探員所遇到的這種類型的網路犯罪明顯上升。With the latest drug bust, police have lowered the curtain on crime in town - for now
隨著最後一批毒品落網,警方對小鎮上犯罪活動的打擊暫告一個段落。分享友人