Find a new product or system that manipulates secret data. This might be the same product or system you analyzed for Exercise 1.8. Conduct a security review of that product or system as described in Section 1.12, this time focusing on issues surrounding code quality (Section 8.4).
Exercise 1.8
Describe how each of the issues in section 8.3 applies to your personal computer's hardware and software configuration.
Monitor the bugtraq mailing list for one week. Create a table listing all the different types of vulnerabilities that are announced or fixed during that week, as well as the number of such vulnerabilities for each type. What sorts of larger inferences can you draw from this table? See https://www.schneier.com/ce.html for additional information about the bugtraq mailing list.