網上犯罪 的英文怎麼說

中文拼音 [wǎngshàngfànzuì]
網上犯罪 英文
cyber crime
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 上名詞[語言學] (指上聲) falling-rising tone
  • : Ⅰ動詞1 (抵觸; 違犯) go against; offend; violate 2 (侵犯) attack; violate; work against 3 (發...
  • : Ⅰ名詞1 (犯法的行為) crime; guilt 2 (過失) fault; misconduct; blame; wrongdoing 3 (苦難; 痛苦...
  • 網上 : on-line shopping
  • 犯罪 : commit a crime [an offense]: 犯罪的中止 desistance from offense; 犯罪和青少年犯罪 crime and delin...
  1. Up to now, complete province keeps clear of lawfully on the net bawdy pornography information 55089, shut lawfully put the website that has bawdy pornography news 2114 the home, columns 384 ; uncover a network bawdy pornography violates guilty case 264 cases, among them, criminal case 111, case of public security administration 153, arrest illegal crime suspect 659

    截至現在,全省依法清除淫穢色情信息55089條,依法關閉存有淫穢色情信息的站2114家、欄目384個;破獲路淫穢色情違法案件264起,其中,刑事案件111起,治安行政案件153起,抓獲違法嫌疑人659名。
  2. In special operation, jiangsu province was made clear " jiangsu of base oneself upon, face the whole nation, outside outspread condition " the fight is politic, to the clew of bawdy pornography crime that discovers on the net, no matter in churchyard open bawdy lubricious love net stands to still be outside the condition, hire network serves a space, organize picked troops strong will, check after all, destroy stoutly, eliminate a harm

    在專項行動中,江蘇省明確了「立足江蘇,面向全國,延伸境外」的斗爭策略,對發現的淫穢色情線索,無論在境內開辦淫穢色情站還是在境外租用路服務空間,都組織精兵強將,一查到底,果斷打掉,消除危害。
  3. Tracing the proceeds of cybercrime

    追查所得贓款
  4. Tracing the proceeds of cybercrime is often as much an exercise in dealing with the incongruous effects of the old and new economies as it is about chasing criminals

    在追查所得贓款的過程中,調查人員不僅要追緝,更要處理新舊經濟模式不協調所帶來的影響。
  5. This study defines internet deviance / crime as internet behavior violates the law or social norms

    摘要本研究定義?偏差?為或為:在電腦?違反法?或道德規范的?為。
  6. Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis

    路取證是對現有路安全體系的必要擴展,已日益成為研究的重點.但目前在進行路取證時仍存在很多挑戰:如路產生的海量數據;從已收集數據中提取的證據的可理解性;證據分析方法的有效性等.針對述問題,利用模糊決策樹技術強大的學習能力及其分析結果的易理解性,開發了一種基於模糊決策樹的路取證分析系統,以協助路取證人員在路環境下對計算機事件進行取證分析.給出了該方法的實驗結果以及與現有方法的對照分析結果.實驗結果表明,該系統可以對大多數路事件進行識別(平均正確分類率為91 . 16 ? ) ,能為路取證人員提供可理解的信息,協助取證人員進行快速高效的證據分析
  7. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip對我國internet的發展起著決定性作用,重慶電信163 / 169路是國家骨幹在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip,現擁有近20萬用戶,佔全市路用戶四分之三以,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的路協議自身的脆弱性;主機、路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為取證,出此之外,還有管理的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  8. Speech by the secretary for commerce, industry and technology, mr henry tang, at the information technology and intellectual property committees joint luncheon meeting of the american chamber of commerce in hong kong on january 9, 2003

    刑事檢控專員江樂士資深大律師在美國華盛頓?舉行的國際檢察官聯合會第八屆年會關于跨國路的全體會議的致辭全文(八月十五日)
  9. As any new technological revolution brings us convenience and puzzle in ethics as well, network is not fierce floods and savage beasts, but it is a double scissors. lt has brought about positive influence but also inevitably some bad effects such as news spread unchecked, trash polluted, network addictation, hacker action even computer crime. how to promote the teenagers news techonology knowledge and take them moralty and intellect

    就像任何新技術革命在給我們帶來便利的同時,也會給人類帶來倫理道德的困惑一樣,路不是洪水猛獸,但它卻是一把「雙刃劍」 。它在給青少年帶來積極影響的同時,也不可避免會造成一些負面效應如信息泛濫,垃圾污染,游戲戀,癮,黑客行為,乃至
  10. Cyber scams are increasingly being committed by organised crime syndicates out to profit from sophisticated ruses rather than hackers keen to make an online name for themselves, according to a top u. s. official

    據美國一高官稱,越來越呈現出有組織的集團,他們通過精密的策劃斂財,不象黑客們僅是急於在一舉成名
  11. The concept of " cybercrime " differs from " computer crime ", its content could be divided into two categories : cybercrime in narrow sense ( i. e., crimes for computer network ) and cybercrime in broad sense ( i. e., crimes by computer network ), the former is basically consistent in the crime features of several crimes in present criminal law of china, the main problem is defining and resisting of cracker behavior

    」的提法與「計算機」有相同之處,也有重要的區別。對的內容,本文傾向于區分為對路的和用路實施的兩種。前者基本與我國現行刑法規定的幾個名的構成相一致,這方面目前較主要的難題是對黑客行為的界定和處理。
  12. The acc cyber support unit acts as an interface between the organisation and the criminal use of technology. the unit includes cyber intelligence support, a cyber investigators training program, computer forensics capability, technical research and development, and providing advice to acc management and staff on cybercrime issues

    委員會轄下的數碼科技支援小組,專責對付利用先進科技進行的活動,其職責包括提供行情報支援、舉辦行調查人員訓練課程、提供電腦資料鑒證服務,進行技術研究與開發,以及就網上犯罪的有關問題向滅委員會管職雙方提供意見。
  13. The apparent surge in internet crime in the new millennium as suggested by the top graph has degraded the usefulness of the net as a marketplace for goods

    圖所示,由於在邁入千禧年後明顯遽增,因而降低了路做為商品交易市場的功能。
  14. Mr mcleod was also in hong kong to present at the 2nd asia cybercrime summit on the acc s role in investigating cybercrime and the newly formed australian hi tech crime centre ahtcc

    麥樂德在香港出席第二屆亞洲行高峰會時,向與會者介紹滅委員會在調查網上犯罪所扮演的角色,以及新成立的澳洲高科技研究中心的工作。
  15. Aside from the added ease and convenience that the virtual world affords global criminals, they were doubly aided by the investigatory process being firmly tied to the physical restrictions of old economy laws

    由於網上犯罪容易而且方便,再加舊式經濟法律使調查工作受到諸多制肘,令國際有機可乘。
  16. Technology crimes refer to crimes targeted at computers or computer systems ( such as unauthorised access to servers or defacement of websites ) and crimes committed via the internet ( such as online gambling ). thus, most of the crimes arising from online games could be categorised as technology crimes

    (一)科技案指直接以電腦或電腦系統為目標的行(例如非法闖入伺服器或損毀頁) ,以及使用行(例如賭博) ,因此游戲引發的行大部分可歸類為科技案。
  17. An olympic information security system must be established to guarantee the network and information security of the games, guard against cyber crimes such as hacking and ensure the stable operation of all kinds of information systems

    建成奧運信息安全體系,確保奧運路和信息的安全,防範黑客攻擊等網上犯罪行為,確保各類信息系統的穩定運行。
  18. To check the network crime, the author put forward proposal of lowering age for penalty and increasing unit crime in the light of that which tendency of low age is more apparent and unit crime arise too many, introducing strict liability in view of that which intentional or disintentional network crime is discriminated difficultly. to meet preventive needs, criminal law should alter result crime to dangerous or behaviour crime. because objective essentialia negotii of network crime is distinct from traditional crime, criminal law should replenish two criminal articals : crime of stealing computer network ; crime of providing computer network

    該部分提出了應對的一系列刑法對策,針對主體的低齡化趨勢明顯和單位大量出現的問題,提出了就要陽氏相對負刑事責任年齡和增設單位的主張;針對過的過失與故意的難辯性,提出要引進嚴格責任的歸責原則;對客觀要件的特殊哇,主張前置打擊力度,將由結果設置為危險或者行為;最後在客體要件,依據客體侵的是復雜j客體,提出要增加竊用計算機路服務和提供計算機名。
  19. Christopher painter, deputy chief of the computer crimes and intellectual property section at the department of justice, said there had been a distinct shift in recent years in the type of cyber criminals that online detectives now encounter

    法務部及知識產權主席說,最近幾年,關于路探員所遇到的這種類型的明顯升。
  20. With the latest drug bust, police have lowered the curtain on crime in town - for now

    隨著最後一批毒品落,警方對小鎮活動的打擊暫告一個段落。
分享友人