[353]十万字视译训练计划之第25弹:美国前国土安全部长汤姆·里奇在2014中国互联网安全大会上的演讲 — ScalersTalk成长会 – 持续行动,笔耕不辍 – ScalersTalk Wonderland

[353]十万字视译训练计划之第25弹:美国前国土安全部长汤姆·里奇在2014中国互联网安全大会上的演讲

口译材料 scalers 浏览 0条评论

今天的材料来自于今年9月中国互联网安全大会上的主题演讲。我在现场听了演讲,觉得这是非常有价值的一个讲稿。对于英语或者口译学习者,你可以用于熟悉关于信息安全方面的内容;对于信息安全从业者,可以通过这个讲稿,了解一下美国官方的一些思路与想法。  

最近在口译100小时训练群的基础上,成立了视译专练小组,针对每周的视译材料进行讨论。如果你一直在进行视译训练,可以在群里询问。

 

每周六推送视译系列,其他相关文章,回复文章前的数字查看:

[166]口译再出发:十万字视译练习计划召集令

//想知道怎么练就看这篇啦

 

[167]十万字视译训练计划之第一弹:联合国秘书长潘基文在CICA的发言

[171]十万字视译训练计划之第2弹:联合国秘书长潘基文在复旦大学的演讲

[173]十万字视译训练计划之第3弹:奥巴马第二任美国总统就职演说

[176]十万字视译训练计划之第4弹:IMF总裁拉加德在中国发展高层论坛上的讲话

[184]十万字视译训练计划之第5弹:欧盟主席巴罗佐在乔治敦大学法学院的讲话

[197]十万字视译训练计划之第6弹:联合国秘书长潘基文在气候领导人峰会上的讲话

[219]十万字视译训练计划之第7弹:IMF总裁拉加德关于非洲崛起的讲话

[227]十万字视译训练计划之第8弹:联合国秘书长潘基文关于粮食安全的讲话

[234]十万字视译训练计划之第9弹:IMF总裁拉加德在清华大学的讲话

[241]十万字视译训练计划之第10弹:潘基文关于教育的讲话

[248]十万字视译训练计划之第11弹:奥巴马在美非领导人峰会上的讲话

[255]十万字视译训练计划之第12弹:拉加德关于阿拉伯世界的讲话

[262]十万字视译训练计划之第13弹:卡梅伦在苏格兰公投前的最后一次演说

[269]十万字视译训练计划之第14弹:奥巴马在联合国气候峰会上的讲话

[283]十万字视译训练计划之第15弹:比尔盖茨在哈佛大学毕业典礼上的讲话

[290]十万字视译训练计划之第16弹:Steve Jobs在斯坦福大学毕业典礼上的讲话

[299]十万字视译训练计划之第17弹:IMF总裁拉加德在斯坦福大学的讲话

[304]十万字视译训练计划之第18弹:苹果CEO库克的出柜宣言

[311]十万字视译训练计划之第19弹:美国总统肯尼迪1961年总统就职演说

[318]十万字视译训练计划之第20弹:习近平主席与奥巴马总统在中美新闻发布会上的讲话

[325]十万字视译训练计划之第21弹:美国总统罗斯福在珍珠港事件后的讲话

[332]十万字视译训练计划之第22弹:“赫敏”沃特森在联合国关于性别平等的演讲

[339]十万字视译训练计划之第23弹:联合国秘书长潘基文在安理会关于性暴力公开辩论的讲话

[346]十万字视译训练计划之第24弹: William Deresiewicz在斯坦福大学的新生演讲

 

下载地址在

http://pan.baidu.com/s/1c0gusSS

链接: http://pan.baidu.com/s/1pJ4uzj1 密码: fb46

 

[3445]From Risk to Resilience: The Global Mission to Secure Cyberspace

Thomas Joseph Ridge

ISC2014, Beijing

Sept. 24, 2014

Good morning ladies and gentlemen.

First, I would like to thank the several sponsors of this conference for their invitation. It is a pleasure to join you. The digital world is full of promise and of peril. It has neither geographic nor political boundaries. It has an ever expanding cohort of attackers – nation states, hacktivists, organized crime, individuals. The attack surface expands everyday as does the level of complexity and sophistication of the malicious code. Cyber-attacks are a global menace and meeting the challenges to manage those risks and to build a culture of resiliency within an organization is critical to its survival and success. I am pleased to offer my thoughts on these and related subjects at your conference today. I have had the opportunity to serve my community and my country in many difference capacities. Those experiences, from my time as an infantry soldier in Vietnam to my service as the first Secretary of the U.S. Department of Homeland Security, have provided priceless opportunities to observe, learn, perform and lead. The totality of those experiences provide the foundation for the thoughts and opinions I share with you. I am old enough to have witnessed the dawn of the internet, the growth and ascendancy of the hyper connected, inter dependent digital world and bold enough to predict the opportunities and challenges of the digital forevermore are permanent. The digital sun will never set.

It wasn’t that long ago that the original computer based data transmission protocol was created to facilitate communication between the U.S. Department of Defense and major research universities. While certainly primitive compared to the digital global ecosystem that drives commerce and culture throughout the world today, its core features remain the same.

The internet is an open system based on anonymity. It was not designed to be a secure communication platform. The opportunities and vulnerabilities within this global network, with electrons racing everywhere, and the capacity, uncertainty and inter dependency within the network bring us together at this conference. The ubiquity of the internet is its strength. The ubiquity is also its weakness. We are all exposed to the potential malicious and malignant use of the internet. We all have a role and a need to combat its improper use. The risk escalates every day. It is a clear, present and permanent danger! The malicious actors are known to all of us. Nations, organized crime, hacktivists, and individuals. Some governments are complicit with these actors. Some are indifferent to their activity. Others are fully aware, but unable to control it. Their motivations and desired outcomes are known to us as well. Disruption, sabotage, theft, espionage. We also know that these digital trespassers are motivated, resourceful, focused and often well financed. As the former U.S. Secretary of Defense Donald Rumsfeld once observed about certain conditions on the battlefield, all of these elements in the digital space are “known knowns”. A comparison with contemporary war fighting, particularly with special operations, illustrates the challenges faced by those responsible to defend their country, company or organization from exploitation by the cyber guerrilla warrior. Cyber soldiers are asymmetric fighters. They eschew traditional battlefield strategy and tactics. They camouflage their identity and activity in the vast, open and often undefended spaces of the internet. Their reconnaissance capabilities are both varied and effective. They constantly probe for weakness, an unauthorized point of entry, a “crack in the defense.” They often use low tech weapons to inflict damage, yet they are able to design and build hi tech weapons to overcome specific defenses and hit specific targets.

The major American retailer, Home Depot, recently reported that a unique previously unseen malware was responsible for the exfiltration of over 56 million pieces of personal information. Attackers have the ability to adapt. Defenders must do so as well. Holding your enemy accountable from the air, land or sea is easier than in the digital space. A military sentry on guard at the perimeter can eliminate the aggressor on sight. Attributing a digital breach to a specific actor and holding him accountable in a meaningful way is often impossible. Let’s be clear. A digital perimeter defense, at one time the most important barrier to attack, is now just part of a multilayered defense strategy. In the 21st century, there are only two kinds of organizations: those that have been hacked and know it and those that have been hacked and don’t know it. There is a Chinese proverb that states “flies never visit an egg with no crack.” Well, the internet is full of cracks. The barbarians are no longer at the gate. They are inside and often exquisitely concealed. That is the chilling and permanent reality of the digital universe forevermore. If this is the reality, then how do governments and companies organize themselves to deal with it? Are they built to play offense, defense or both? For centuries, governments have fought to gain information about their adversaries. As Sun Tsu wrote: “It is only the enlightened ruler and the wise general who will use the highest intelligence of the army for purposes of spying and thereby they achieve great results.” First, by intercepting letters. By the 19th century, the efforts included intercepting telegraph messages. And, in the 20th century, radio and telephonic communications. But today, cyber traffic is more than just communicating. The digital world is connected to critical industrial control systems, financial systems, life sustaining systems and more. All susceptible to attach and destruction. There have never been any international norms around such behavior. And the possibility of a cyber-attack or attacks escalating into conflict is real. Nations will always act to protect, promote and improve their national and economic security interests.

 

 

下载Pdf可查看完整讲稿

http://www.scalerstalk.com/100k-25

点击原文链接可查看

 

 

回复“VIP”查看2015年会员计划招募;回复“100小时”查看口译100小时训练计划;回复“十万字”查看十万字视译计划。

S君的口译100小时、十万字视译训练交流QQ群,欢迎加入(群号为231441722)

S君个人微信号,ScalersTalker欢迎添加。

 

如果你觉得S君的文章对你有用,让你有所思有所想有所行动,不用感谢,打赏请S君喝杯咖啡就行:P 。支付宝账号是

scalerstalk [at] gmail [dot] com

想看更多相关文章,关注 ScalersTalk 回复任意小于标题括号中的三位数字查看。或者去我的站点 ScalersTalk.com 查看历史文章。

发表评论