It is inevitable that vulnerabilities will be discovered in the production of information technology products, regardless of how much time and effort is placed into identifying and removing flaws during initial development. Based on this inevitability one would surmise that a logical structured...