An Architecture for Implementing Customizable Medical Image Processing Systems

Total Page:16

File Type:pdf, Size:1020Kb

An Architecture for Implementing Customizable Medical Image Processing Systems MEDINF098 B. Cesnik et al. (Eds) Amsterdam: lOS Press © 1998 1M/A. All rights reserved An Architecture for Implementing Customizable Medical Image Processing Systems Athanasios M. Demiris, Carlos E. Cardenas S., Manuela H. Makabe, Hans-Peter Meinzer Deutsches Krebsforschungszentrum, Heidelberg, Germany Abstract nario in system development. According to this scenario smaller systems addressing specific topics are created sepa­ Monolithic image processing systems containing a superset of rately on demand and may be integrated into a larger system in imaging algorithms are difficult to use and require specialized a' component-like manner. Creating specialized components knowledge ofimage processing. Thus they increase the work­ addressing specific problems instead of all-purpose systems load ofmedical personnel instead ofmaking the work situation enforces user centered design and development as well as easier. Customizable medical image processing systems on the encapsulation of overcomplicated functionality, which is feasi­ other hand may be easily adapted to address various problems ble, only when a concrete and restricted application domain is . in the medical image processing domain integrating only the addressed. necessary subset ofimage processingfunctionality presented in an intuitive way. One possible instantiation ofthat scenario is when an end user using an extensible platform system, which we characterize as a In this work we present an architecture for creating customiza­ customizable medical image processing system, contacts soft­ ble image processing systems for the medical domain. We ware developers every time the functionality needs to be address three major topics: 1.) easy, goal-oriented customiza­ extended to target a new problem, like volumetric measure­ tion ofimaging systems by using a generalized algorithm model ments for pathologic changes in the liver, cancer detection in and repository, 2.) dynamic, data-oriented parameterization of mammography, visualization ofthe beating heart etc. In order the selected algorithms and 3.) semi-automated generation of for developers to react to these needs in a shorter time and thus user interface components for each new algorithm to be reduce the period oftime from demand to delivery (lead time), inserted in an imaging system based on cognitive ergonomics. an advanced, easy to customize building tool is needed. A fur­ We conclude with the presentation ofan initial implementation ther advantage ofthe use of such a development tool is the con­ ofthe architecture in form ofan object-orientedframework for sistency of the developed applications. the creation ofcomponents for customizable medical imaging When customizing or creating a new software system for the systems. medical imaging domain there are some aspects that delay the response to a request for such a system. An example could be Keywords the request for a volumetric system in liver surgery. Such a sys­ Object-Oriented Frameworks; Algorithm Repository; Imaging tem requires methods for retrieving and displaying the image Systems; User Interfaces; Ergonomics data, algorithms for the segmentation, i.e. identification of healthy and pathologic tissue in the images, the selection of the Introduction appropriate algorithms for image processing, subsequently the estimation of optimal parameter sets for these algorithms to The image related part ofthe work of physicians and especially operate in a meaningful way on the given data, and fmally the radiologists and surgeons has been continuously enhanced by creation of a user interface for the resulting system. An archi­ computer supported components within the past decades. One tecture that supports developers in this process offers means for goal ofthe developers ofsuch systems was to ensure flexibility reducing the time spent with all these steps. In this paper we are by supplying their end users with a maximum of functionality presenting such an architecture and its partly implementation in in order to cover for all possible cases that might arise in the form of an object-oriented framework [1]. future. The results were monolithic systems containing too many features and being difficult to use. The level on which the Materials and Methods use of these systems was taking place was closer to the image processing part and farther from the actual end user needs. The work presented here started with the creation ofa volumet­ The advances.in software engineering within the past years and ric system for liver resection planning. We developed VolMes, especially in object-oriented technology gave rise to a new see- a system for image segmentation and quantitative measure- 1100 1101 A.M Demiris Developer of image processing routines Medical End User query algorithms or query/store parametersets insert new algorithm ~~ stausuca/observauons GUI creation support Repository and dynamic parameter calculations store/retrieve L-f-~--F-.f-----+ Database management system Abstract database connection interface Figure 2 - The global scenario ofthe architecture ments in contrast enhanced images of liver tissue (CT or MR) Instead ofcustomizing VolMes statically by extending and rec­ containing tumors or metastatic regions (see figure 1). ompiling we decided to design a dynamic solution that would The system contains image and DICOM-information display, address the quick replacement of algorithms by looking up semiautomatic and manual segmentation facilities. It was cre­ alternative algorithms' according to the new goal and a flexible ated according to ergonomic design criteria and in continuous estimation of default parameters for these algorithms every time cooperation with clinicians (user centered design). in order to be the kind ofdata set changes. These aspects are dealt with in our smoothly integrated in clinical routine. architecture by an algorithm repository and a component for dynamically estimating parameters for various types of image data of different anatomical regions. Subsequently we decided to integrate the new algorithms with pre-customized user inter­ face components for the control of these algorithms. We address this problem in our architecture with a model for auto­ matically creating user interface elements according to ergo­ nomic criteria for every new algorithm. In figure 2 we show the all-round scenario and in the next paragraphs we explain how the corresponding parts ofthe architecture are designed. A generic medical image processing algorithm model and repository When trying to select the algorithms needed to solve a given problem the developers usually look up possible solutions in their own "arsenal" (or the ones oftheir teams). Usually devel­ opers get acquainted with a small set of algorithms they use over and over and thus may skip other solutions. The documen­ tation of the algorithms takes place in a rather informal way thus allowing discrepancies in the way it is done among various developers. Less experienced developers sometimes do not Figure 1 - A screenshotofthe image segmentation andvolumet- have the chance to profit from existing solutions due to the ric system VolMes complete lack of documentation especially when the developers The system was subsequently used in other medical domains of existing algorithms have left the team. (e.g. heart segmentation) which led to the conclusion that for A central algorithm repository is definitely a way to overcome these cases other default settings for the parameters of the tools these barriers and reduce the amount of time needed for the and in many cases completely different tools were needed. selection of algorithmic material. Such a repository allows a 1102 Imaging andImage Management faster lookup of algorithms according to several criteria espe­ repository along with the algorithm. When a new algorithm is cially goal-oriented and not only implementation-oriented ones. used or an existing one is to be applied to a new case there are For an efficient repository to be created a flexible data model is no default values for the algorithm's parameter set (its signa­ neededIn order to ensure a general character of such a reposi­ ture). For these cases we developed a component estimating tory model we concentrated on extending existing models of parameter sets in an iterative process. This component looks up general algorithms foundin programming languages and speci- initial settings in the repository or calculates random ones. It fications of standards like the reflective! object-oriented pro­ applies the algorithm to the image data and evaluates the result­ gramming languages Smalltalk [2] and Java [3] and the ing binary image according to a series ofmeasurements. specification of the Object Database Standard by OMG 14] as We introduced a domain model containing relative measure­ well as the CORBA [5] specification. ments and anatomical landmarks for the elimination of the In our model we introduced the notion ofthe algorithm as a spe­ interpersonal variation for various regions ofthe body and con­ cialization ofa software building block. We described the algo­ tinuouslyextend the model to include new regions. These meas­ rithm in terms ofits signature (the parameters and return value) urements include: and its context. By context we mean both the kind of and the size ofthe segmented object relative to an easy to detect restrictions on the data to be processed (such as the format or organ (e.g. liver to thorax in CT), the datatype of a digital image) as well as the execution envi­ center ofinertia ofthe
Recommended publications
  • Chapter 1. Origins of Mac OS X
    1 Chapter 1. Origins of Mac OS X "Most ideas come from previous ideas." Alan Curtis Kay The Mac OS X operating system represents a rather successful coming together of paradigms, ideologies, and technologies that have often resisted each other in the past. A good example is the cordial relationship that exists between the command-line and graphical interfaces in Mac OS X. The system is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X exemplifies how a capable system can result from the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and, of course, individuals. Apple has been around since 1976, and many accounts of its history have been told. If the story of Apple as a company is fascinating, so is the technical history of Apple's operating systems. In this chapter,[1] we will trace the history of Mac OS X, discussing several technologies whose confluence eventually led to the modern-day Apple operating system. [1] This book's accompanying web site (www.osxbook.com) provides a more detailed technical history of all of Apple's operating systems. 1 2 2 1 1.1. Apple's Quest for the[2] Operating System [2] Whereas the word "the" is used here to designate prominence and desirability, it is an interesting coincidence that "THE" was the name of a multiprogramming system described by Edsger W. Dijkstra in a 1968 paper. It was March 1988. The Macintosh had been around for four years.
    [Show full text]
  • Rights Reserved. Permission to Make Digital Or Hard Copies of All Or Part Of
    Copyright © 1994, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 ELECTRONICS RESEARCH LABORATORY College ofEngineering University ofCalifornia, Berkeley 94720 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 ELECTRONICS RESEARCH LABORATORY College ofEngineering University ofCalifornia, Berkeley 94720 Microsoft Windows NT And The Competition for Desktop Computing January 1994 Department ofElectrical Engineering and Computer Sciences University ofCalifornia Berkeley, California 94720 Abstract This report contains two papers, An Introduction to Microsoft Windows NT And Its Competitors, and The Status ofWindows NT and Its Competitors At The End of1993. The first paper, written in April 1993,presents an overview of the technology of Windows NT, and analyzes the competitors and competitive factors in the desktop operating system race.
    [Show full text]
  • Automatic Graph Drawing Lecture 15 Early HCI @Apple/Xerox
    Inf-GraphDraw: Automatic Graph Drawing Lecture 15 Early HCI @Apple/Xerox Reinhard von Hanxleden [email protected] 1 [Wikipedia] • One of the first highly successful mass- produced microcomputer products • 5–6 millions produced from 1977 to 1993 • Designed to look like a home appliance • It’s success caused IBM to build the PC • Influenced by Breakout • Visicalc, earliest spreadsheet, first ran on Apple IIe 1981: Xerox Star • Officially named Xerox 8010 Information System • First commercial system to incorporate various technologies that have since become standard in personal computers: • Bitmapped display, window-based graphical user interface • Icons, folders, mouse (two-button) • Ethernet networking, file servers, print servers, and e- mail. • Sold with software based on Lisp (early functional/AI language) and Smalltalk (early OO language) [Wikipedia, Fair Use] Xerox Star Evolution of “Document” Icon Shape [Wikipedia, CC BY-SA 3.0] 1983: Apple Lisa [Wikipedia, CC BY-SA 2.0 fr] Apple Lisa • One of the first personal computers with a graphical user interface (GUI) • In 1982, Steve Jobs (Cofounder of Apple, with Steve Wozniak) was forced out of Lisa project, moved on into existing Macintosh project, and redefined Mac as cheaper, more usable version of Lisa • Lisa was challenged by relatively high price, insufficient SW library, unreliable floppy disks, and immediate release of Macintosh • Sold just about 10,000 units in two years • Introduced several advanced features that would not reappear on Mac or PC for many years Lisa Office
    [Show full text]
  • This Is a Fairy Tale •.• NOT! a Primer on Moving SAS® Applications
    This is a Fairy Tale•.• NOT! A Primer on Moving SAS® Applications Across Graphical Operating Systems James Hefner, Entergy Corporation, Beaumont, TX lineup. The PowerPC's PowerOpen operating system should be ABSTRACT able to run Windows, Windows NT, OS/2, Macintosh, and UNIX applications unmodified (using SoftPC to run Windows & OS/2 Currently, most SAS Software application developers have on~ apps). Current plans are to offer these new machines at prices one or two graphical operating systems (such as Microsoft that are highly competitive with the current top-of-the-!ine WindowsTN, or OSFlMoti~ to support. However, the pending offerings by IBM PC manufacturerS and Apple, nol 10 mention release of the SAS System for the Apple® Macintosh®I and the UNIX workstations. This could mean a change in the platform you introduction of new hardware and software such as the PowerPC are currently using, as well as the ability (or need) to be able to and Wabi, means that application developers may have to use and write applications using any of the five operating support two or more graphical operating systems. systems. This paper is intended to assist application developers, both in New Graphical Operating Systems the teaching of the fundamentals of graphical operating systems, and in Ihe moving of SAS/Af® and SAS/EIS® applicalions from In addition to the platforms mentioned above, Apple and IBM are one operating system to another. currently working on the Taligent operating system, which will have an object-oriented, graphical front end. IBM is also INTRODUCTION discussing porling its object·orienled 0512 2.x Workplace Shell 10 a new ver.sion of PC DOS® and AIX®, IBM's version of UNIX (to If you are a SAS' application developer, you may currently be be called Workplace OS).
    [Show full text]
  • Volume 15, 1~L~Mber 2 April 1994
    ISSN 1035-7521 AUUG Inc. Newsletter Volume 15, 1~l~mber 2 April 1994 Registered by Australia Post, Publication Number NBG6524 The AUUG incorporated Newsletter Volume 15 Number 2 April 1994 CONTENTS AUUG General Information ...................... 3 Editorial ............................ 5 AUUG President’s Page ....................... 6 AUUG Corporate Sponsors - A New Level of Participation ............ 7 AUUG Institutional Members ..... : ............... 8 Letters to the Editor ........................ 11 Announcements AUUG Appoints New Business Manager ................ 15 AUUG Freephone Number .................... 16 McKusick does Oz T-shirt .................... 17 Call for Articles for the Australian .................. 18 AUUG & Zircon Systems Reach Agreement ............... 19 AUUG & the Express Book Store Reach Agreement ............ 20 AUUG Local Chapters AUUG Regional Contacts .................... 21 AUUG Inc. - Victorian Chapter ................... 22 Update on AU-tJG Inc. - Victorian Chapter Activities Stephen Prince . 23 From the Western Front Janet Jackson .... 24 WAUG - Meeting Reviews Adrian Booth .... 25 1994 Perth AUUG Summer Conference Overview Adrian Booth .... 26 Impressions of the 1994 Perth AUUG Summer Conference Janet Jackson .... 28 AUUG NSW Chapter Julian Dryden .... 30 AARNet Mail Affiliation., ...................... 31 Book Reviews .......................... 35 Prentice Hall Book Order Form ................... 41 WOodsLane Information ..................... 42 Open System Publications ...................... 43 !AUUGN
    [Show full text]
  • Michael J. Harper Standalone Code
    Michael J. Harper Standalone Code LLC 57195 Beaver Drive, PO Box 3846 (541) 362-1840 Sunriver OR 97707 [email protected] @doktahahpah, @standalonecode, www.github.com/mharper, www.standalonecode.com Summary I have been a software developer since 1982 and an independent contractor/consultant since 1992. For the past several years, I have focused on two areas of development: mobile development with iOS and Android and web development with Ruby on Rails. I conceived and implemented the TRX FORCE app — the 12-week conditioning program designed for the US Military — on both iOS and Android — which appeared in the Apple "Strength" commercial. In addition, I have collaborated on the Norton Online Backup iOS app and I built an app named “Circle 8” that helps tourists find their way around Sunriver, OR and its 33+ miles of bike paths. Another project was a trifecta of Rails, iOS, and Android development showcasing how to “Live Like a Local” when visiting the Hotel Monaco DC. I have also implemented Android versions of Circle 8, Analog Analytics, and PEAR Sports (Bluetooth LE heart-rate based real-time coaching). For Star Wars Celebration in Anaheim, CA in April 2015, I implemented an iBeacon-based "Scanner" app that displays "trading cards" for each character scanned. I have been working with iBeacon/AltBeacon technology on iOS, Android, and Linux for Radius Networks for the past year. I discovered Ruby on Rails via the Java Posse podcast when I was doing Java EE development for Symantec circa 2006. I have collaborated on numerous Rails apps since then including Norton Online Backup for Symantec and Hubbub Health for Regence.
    [Show full text]
  • Leveraging Object-Oriented Frameworks
    Leveraging Object-Oriented Frameworks Leveraging Object-Oriented Frameworks Table OF contents Introduction Software Development Approaches Procedural Programming Object-Oriented Programming Framework-Oriented Programming Applying Frameworks - An Overview Applying Application-Level Frameworks Applying System-Level Frameworks Key Advantages of Frameworks Taligent's Approach to Frameworks Taligent Frameworks - An Architectural Perspective Taligent Application-Level Frameworks Taligent System-Level Frameworks Taligent Development Environment Frameworks How Taligent is Changing the Programming Model Domain-Specific Frameworks Summary Next Steps Additional Reading Taligent White Papers INTRODUCTION Over the last two decades, software development has changed significantly. Its evolution has been motivated largely by the quest to help developers produce software 1 of 16 Leveraging Object-Oriented Frameworks faster and to deliver more value to end-users. Despite gains, the industry still faces long development cycles which produce software that usually doesn't address business problems adequately--pointing to the limitations of traditional programming and today's system software environments. These limitations have moved the software industry to embrace object-oriented technology (OOT) because of its potential to significantly increase developer productivity and encourage innovation. Taligent believes that OOT indeed has the potential to dramatically improve the software development process. However, we believe the focus should not only be on OOT, but on how this technology is delivered in order to fully realize the benefits that it has to offer. In our view, object-oriented frameworks--extensible sets of object-oriented classes that are integrated to execute well-defined sets of computing behavior--provide the necessary foundation for fully exploiting the promises of OOT. Which is why Taligent is building a new system software platform and integrated development environment based entirely on OOT and object-oriented frameworks.
    [Show full text]
  • 101 Ways to Save Apple by James Daly
    http://www.wired.com/wired/archive/5.06/apple_pr.html 101 Ways to Save Apple By James Daly An assessment of what can be done to fix a once-great company. Dear Apple, In the movie Independence Day, a PowerBook saves the earth from destruction. Now it's time to return the favor. Unfortunately, even devoted Mac addicts must admit that you look a little beleaguered these days: a confusing product line, little inspiration from the top, software developers fleeing. But who wants to live in a world without you? Not us. So we surveyed a cross section of hardcore Mac fans and came up with 101 ways to get you back on the path to salvation. We chose not to resort to time travel or regurgitate the same old shoulda/coulda/wouldas (you shoulda licensed your OS in 1987, for instance, or coulda upped your price/performance in 1993). We don't believe Apple is rotten to the core. Chrysler nearly went under in the late 1970s and came back to lead its industry. Here's a fresh assessment of what can be done to fix your once-great company using the material at hand. Don't wait for a miracle. You have the power to save the world - and yourself. Edited by James Daly 1. Admit it. You're out of the hardware game. Outsource your hardware production, or scrap it entirely, to compete more directly with Microsoft without the liability of manufacturing boxes. 2. License the Apple name/technology to appliance manufacturers and build GUIs for every possible device - from washing machines to telephones to WebTV.
    [Show full text]
  • Operating Systems, 1997., the Sixth Work
    Experience with the Development of a Microkernel-Based, Multiserver Operating System Freeman L. Rawson I11 IBM Austin Abstract and feel” of any operating system in the set while maintaining a single system image that shared as much code as possible among the During the first half the 1990s IBM developed a set . of of personalities operating system products called Worhplace OS that was bused . that offered full compatibility with all of the operating on the Mach 3.0 microkernel and Taligent’s object-oriented systems in the set and with DOSlWindows 3.1 TalOS. These products were intended to be scalable, portable + which offered the choice of a fully object-oriented and capable of concurrently running multiple operating system operating system including both object-oriented interfaces personalities while sharing as much code as possible. The and an object-oriented implementation operating system personalities were constructed out of a set of - which provided real time operation. user-level personality and personality-neutral servers and Since the technologies were modular, the project was libraries. While we made a number of important changes to structured as a set of related products so that customers could Mach 3.0, we maintained its fundamentals and the multi-server buy precisely the parts that they needed. The project as a design throughout our project. In evaluating the resulting system, whole was known as Workplace OS (WPOS) but was often a number ofproblems are apparent. There is no good way to referred to as the “microkemel-based” system because of the factor multiple existing systems into a set of functional servers central role played by the microkernel and because the without making them excessively large and complex.
    [Show full text]
  • MVP: Model-View-Presenter the Taligent Programming Model for C++ and Java
    (C) Copyright Taligent, Inc. 1996 - All Rights Reserved MVP: Model-View-Presenter The Taligent Programming Model for C++ and Java Mike Potel VP & CTO Taligent, Inc. Taligent, a wholly-owned subsidiary of IBM, is developing a next generation programming model for the C++ and Java programming languages, called Model-View-Presenter or MVP, based on a generalization of the classic MVC programming model of Smalltalk. MVP provides a powerful yet easy to understand design methodology for a broad range of application and component development tasks. Taligent’s framework-based implementation of these concepts adds great value to developer programs that employ MVP. MVP also is adaptable across multiple client/server and multi-tier application architectures. MVP will enable IBM to deliver a unified conceptual programming model across all its major object-oriented language environments. Smalltalk Programming Model The most familiar example of a programming model is the Model-View-Controller (MVC) model1 of Smalltalk developed at Xerox PARC in the late 1970’s. MVC is the fundamental design pattern used in Smalltalk for implementing graphical user interface (GUI) objects, and it has been reused and adopted to varying degrees in most other GUI class libraries and application frameworks since. Controller data gestures change & events notification Model View data access Smalltalk represents a GUI object such as a check box or text entry field using the three core abstractions of MVC. A model represents the data underlying the object, for example, the on-off state of a check box or the text string from a text entry field. The view accesses the data from the model and specifies how the data from the model is drawn on the screen, for example, an actual checked or unchecked check box, or a text entry box containing the string.
    [Show full text]
  • Can Apple Take Microsoft in the Battle for the Desktop?
    Search the web Search this site Search Search Amazon: Can Apple Take Microsoft in the Battle for the Desktop? Sunday, March 4, 2007 | | Del.icio.us | Technorati | About RDM | Forum : Feed | [email protected] ¿Puede Apple ganar a Microsoft la batalla de sobremesa? (en español) Some analysts are nostalgic for the days when they could appear intelligent merely by gushing about everything from Microsoft. They felt safe in recommending everything the company released, knowing that there were no real alternatives, and that anything the company could deliver would more or less have to be purchased. All their advice and analysis helped to create the general illusion that Microsoft was divinely fated to succeed, and that no rival could ever hope to challenge the company. That illusion helped to reinforce the real power wielded by Microsoft as the dominant vendor of PC desktop operating systems. Maintaining that illusion was as important to Microsoft as a properly running propaganda machine is to a banana republic dictator. As power begins to falter, maintaining an illusion of strength becomes increasingly important. Ironically, the desperate measures that are frequently taken to sustain such an illusion often serve to distract from the real problems that need to be fixed and subsequently cause greater damage. The Ghost of Past Failures Microsoft certainly isn't the first tech company to stumble in a grand way. Apple fell from its position as a leader in the tech industry in the 80s to being "hopelessly beleaguered" within a decade. In Apple's case, the company began making serious mistakes during a decade of limited competition leading up to 1995.
    [Show full text]
  • CYBERSECURITY When Will You Be Hacked?
    SUFFOLK ACADEMY OF LAW The Educational Arm of the Suffolk County Bar Association 560 Wheeler Road, Hauppauge, NY 11788 (631) 234-5588 CYBERSECURITY When Will You Be Hacked? FACULTY Victor John Yannacone, Jr., Esq. April 26, 2017 Suffolk County Bar Center, NY Cybersecurity Part I 12 May 2017 COURSE MATERIALS 1. A cybersecurity primer 3 – 1.1. Cybersecurity practices for law firms 5 – 1.2. Cybersecurity and the future of law firms 11 – 2. Information Security 14 – 2.1. An information security policy 33 – 2.2. Data Privacy & Cloud Computing 39 – 2.3. Encryption 47 – 3. Computer security 51 – 3.1. NIST Cybersecurity Framework 77 – 4. Cybersecurity chain of trust; third party vendors 113 – 5. Ransomware 117 – 5.1. Exploit kits 132 – 6. Botnets 137 – 7. BIOS 139 – 7.1. Universal Extensible Firmware Interface (UEFI) 154– 8. Operating Systems 172 – 8.1. Microsoft Windows 197 – 8.2. macOS 236– 8.3. Open source operating system comparison 263 – 9. Firmware 273 – 10. Endpoint Security Buyers Guide 278 – 11. Glossaries & Acronym Dictionaries 11.1. Common Computer Abbreviations 282 – 11.2. BABEL 285 – 11.3. Information Technology Acronymns 291 – 11.4. Glossary of Operating System Terms 372 – 2 Cyber Security Primer Network outages, hacking, computer viruses, and similar incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications, and data networks increase, so do the opportunities for exploitation. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.
    [Show full text]