目的对3个遗传性痉挛性截瘫(hereditary spastic paraplegia,HSP)患者家系的临床表现及致病基因进行分析。方法对甘肃省妇幼保健院(甘肃省中心医院)收集的3个HSP患者家系进行基因分析。结果家系1中先证者为FA2H c.159_176delGGCGGGCCAGG...目的对3个遗传性痉挛性截瘫(hereditary spastic paraplegia,HSP)患者家系的临床表现及致病基因进行分析。方法对甘肃省妇幼保健院(甘肃省中心医院)收集的3个HSP患者家系进行基因分析。结果家系1中先证者为FA2H c.159_176delGGCGGGCCAGGACATCAG(p.Arg53_Ser59delinsSer)纯合变异导致的常染色体隐性痉挛性截瘫35型,家系2中的先证者为AP4B1 c.1399G>T(p.Glu467Ter)纯合变异导致的常染色体隐性痉挛性截瘫47型,家系3中先证者为SPG11 c.7023C>G(p.Tyr2341Ter)的纯合变异导致的常染色体隐性痉挛性截瘫11型。其中,AP4B1 c.1399G>T(p.Glu467Ter)位点为尚未报告的变异。根据美国医学遗传学与基因组学学会(American College of Medical Genetics and Genomics,ACMG)指南,该变异的致病性评级为致病性变异。结论本研究丰富了HSP致病基因AP4B1的变异谱,为提高临床对HSP患者的认识与诊断能力提供了基础性数据。展开更多
The two-factor authentication mechanism is gaining popularity as more people are becoming aware of the need to secure their identities. In the current form, existing 2FA systems are defenseless against phishing attack...The two-factor authentication mechanism is gaining popularity as more people are becoming aware of the need to secure their identities. In the current form, existing 2FA systems are defenseless against phishing attacks. They do not provide any visual indicator to the user to check the website’s validity before logging in during phishing attacks. This exposes the user’s password during the phishing attack. Two-factor authentication needs to be enhanced to provide a mechanism to detect phishing attacks without adding a significant burden on the user. This research paper will propose a novel 2-FA TOTP mechanism to provide a subconscious indicator during a phishing attack. In comparison, the new proposed novel approach provides better security against phishing attack. Lastly, the mathematical analysis is performed to understand the TOTP variance and validate the security considerations against the existing 2FA systems with respect to adversary attack.展开更多
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario...Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.展开更多
文摘目的对3个遗传性痉挛性截瘫(hereditary spastic paraplegia,HSP)患者家系的临床表现及致病基因进行分析。方法对甘肃省妇幼保健院(甘肃省中心医院)收集的3个HSP患者家系进行基因分析。结果家系1中先证者为FA2H c.159_176delGGCGGGCCAGGACATCAG(p.Arg53_Ser59delinsSer)纯合变异导致的常染色体隐性痉挛性截瘫35型,家系2中的先证者为AP4B1 c.1399G>T(p.Glu467Ter)纯合变异导致的常染色体隐性痉挛性截瘫47型,家系3中先证者为SPG11 c.7023C>G(p.Tyr2341Ter)的纯合变异导致的常染色体隐性痉挛性截瘫11型。其中,AP4B1 c.1399G>T(p.Glu467Ter)位点为尚未报告的变异。根据美国医学遗传学与基因组学学会(American College of Medical Genetics and Genomics,ACMG)指南,该变异的致病性评级为致病性变异。结论本研究丰富了HSP致病基因AP4B1的变异谱,为提高临床对HSP患者的认识与诊断能力提供了基础性数据。
文摘The two-factor authentication mechanism is gaining popularity as more people are becoming aware of the need to secure their identities. In the current form, existing 2FA systems are defenseless against phishing attacks. They do not provide any visual indicator to the user to check the website’s validity before logging in during phishing attacks. This exposes the user’s password during the phishing attack. Two-factor authentication needs to be enhanced to provide a mechanism to detect phishing attacks without adding a significant burden on the user. This research paper will propose a novel 2-FA TOTP mechanism to provide a subconscious indicator during a phishing attack. In comparison, the new proposed novel approach provides better security against phishing attack. Lastly, the mathematical analysis is performed to understand the TOTP variance and validate the security considerations against the existing 2FA systems with respect to adversary attack.
文摘Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.