This site uses cookies.
Some of these cookies are essential to the operation of the site,
while others help to improve your experience by providing insights into how the site is being used.
For more information, please see the ProZ.com privacy policy.
This person has a SecurePRO™ card. Because this person is not a ProZ.com Plus subscriber, to view his or her SecurePRO™ card you must be a ProZ.com Business member or Plus subscriber.
Affiliations
This person is not affiliated with any business or Blue Board record at ProZ.com.
English to Spanish: U.S. government resources for cybersecurity
Source text - English The subject article in your July 2015 issue of Control Design by Dan Herbert (“Tear Down This Wall,” Control Design, July 2015, p20), has given me cause for concern as it ignores fundamental security issues that can be introduced when connecting control system environments to other environments such as business networks. While the world is becoming more and more interconnected and “connecting machines to IT systems provides a number of benefits,” such connectivity, if not installed properly, can introduce many security challenges. These inter-connections can enable security vulnerabilities and potential pathways for compromise of the control environment by malicious threat actors.
The mission of the Department of Homeland Security’s (DHS’s) National Cybersecurity and Communications Integration Center (NCCIC), and specifically the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) is to assist critical infrastructure asset owners to reduce cyber risks to control systems and processes that operate the nation’s critical infrastructure. ICS-CERT responds to cybersecurity incidents on a daily basis, almost all involving compromises of control system environments via connections to the corporate network. Once on the network, intruders often move laterally looking for other connected zones or networks. Without proper network segmentation and monitoring of communications, the control system environment can potentially be compromised, in some cases providing the ability for the intruder to take control of the process.
When it comes to protecting control system networks from these types of incidents, ICS-CERT recommends three basic principles:
1. Do not allow direct connectivity from the Internet into your ICS network.
2. Never allow any machine on the control network to talk directly to a machine on the business network or Internet. This means controlling communications flows through intermediary networks such as de-militarized zones (DMZs), virtual private networks (VPNs), thorough access controls and in some cases utilizing one-way traffic devices.
3. Configure firewalls to allow only required and specific devices/ports to communicate with one another through the firewall. Block everything else by default.
Translation - Spanish El titulo del articulo (“Tear Down This Wall,” Control Design, July 2015, p20) escrito por Dan Herbert en su revista de Control Design de Julio del 2015, ha captado mi interés porque su artículo ignora problemas básicos de seguridad que se manifiestan cuando se conectan ambientes de sistemas de control con otros ambientes tales como las redes de negocios.
Mientras el mundo se va poniendo más y más interconectado y “la conexión de equipos de tecnología de la información ó IT (por sus siglas en inglés) produce muchos beneficios”, tal conectividad, si no se conectan apropiadamente, pueden producir mucha debilidad en la seguridad. Estas interconexiones pueden permitir vulnerar la seguridad y vías potenciales para comprometer el ambiente de control por intrusos con amenazas maliciosas.
La misión del DHS, Centro de integración de la Seguridad Cibernética Nacional ó NCCIC (por sus siglas en inglés) y específicamente el ICS-CERT es apoyar a los dueños de las infraestructuras críticas reducir los riesgos cibernéticos a los sistemas y procesos que funcionan en la infraestructura crítica de la nación. ICS-CERT cubre los incidentes de la seguridad cibernética diariamente, casi todas relacionadas con la vulnerabilidad de los ambientes del sistema de control al conectarse a la red corporativa. Una vez en la red, los intrusos con frecuencia se mueven sigilosamente buscando otras zonas conectadas ó redes. Sin la apropiada segmentación de la red y el monitoreo de las comunicaciones, el ambiente del sistema de control puede potencialmente verse comprometido, en algunos casos dando el permiso para que el intruso tome el control del proceso.
Cuando se trata de proteger las redes del sistema de control de este tipo de incidente, el ICS-CERT recomienda 3 practicas básicas:
1. No permitir conexión directa entre la red del sistema de control e internet.
2. Nunca permita que ninguna maquina de la red de control se comunique directamente con una maquina de la red corporativa e internet. Lo que significa controlar el flujo de las comunicaciones a través de redes intermediarias tal como las zonas desmilitarizadas ó DMZs (por sus siglas en inglés), redes privadas virtuales ó VPNs (por sus siglas en inglés), a través de control de acceso y en algunos casos utilizando dispositivos de tráfico unidireccional.
3. Configure firewalls para permitir solamente a dispositivos ó puertos requeridos y específicos comunicarse entre sí a través del firewall. Bloquee todo lo demás por defecto.
English to Spanish: PWRficientTM PA6T-1682M
Source text - English The PWRficientTM PA6T-1682—a high-performance dual-core platform processor featuring two DDR2 memory controllers, 2MB of L2 cache, and a flexible I/O subsystem—is a versatile processing platform for high-performance computing and embedded applications. Because the 1682M achieves dramatically better performance per watt than competing multigigahertz microprocessors, equipment manufacturers can use the processor as the basis for products that are cool and efficient yet high in performance.
Translation - Spanish El PWRficient modelo PA6T-1682M – una plataforma de alto rendimiento con procesadores de doble núcleo caracterizado por 2 controladores de memoria DDR2, 2MB de memoria cache L2 y un flexible subsistema de I/O – es una plataforma procesadora muy versátil para aplicaciones de alto rendimiento computacional y aplicaciones incrustadas. Debido a que el modelo 1682M logra dramáticamente mejor rendimiento por vatio que sus competidores procesadores multigigahertz, los fabricantes de equipos pueden usar el procesador como la base de sus productos que son súper y eficientes así como alto en rendimiento.
English to Spanish (Michigan State University English Language Center) English to Spanish (Michigan State University)
Memberships
N/A
Software
Adobe Acrobat, MateCat, Microsoft Excel, Microsoft Word, Powerpoint, ProZ.com Translation Center, Wordfast
Bio
During the course of my professional career as
an electronic engineer, I worked in sales and in the technical area of
different companies and found out they have a common denominator: TRANSLATION. Without
knowing it, I was always linked to translation that started in high school
until today. Almost invisible, the translation experience that I have
accumulated during all these years as an electronic engineer has served to
strengthen my grammar, pronunciation, reading, vocabulary and comprehension of
the English language. Although my university degree is not that of a translator
and neither were my jobs, my invisible experience as such has turned me into
one whose objective is to extract the real meaning of translations.
This user has earned KudoZ points by helping other translators with PRO-level terms. Click point total(s) to see term translations provided.