{"id":350,"date":"2024-04-01T00:55:04","date_gmt":"2024-04-01T00:55:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/?p=350"},"modified":"2024-04-01T00:55:04","modified_gmt":"2024-04-01T00:55:04","slug":"week-12-journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/2024\/04\/01\/week-12-journal-entry-13\/","title":{"rendered":"Week 12 Journal Entry 13"},"content":{"rendered":"\n<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings. <\/p>\n\n\n\n<p>After reading the article I was shocked to find that according to HackerOne, 93% of companies in the Forbes Global 200 lack vulnerability disclosure policies. These policies allow security personnel to submit bugs to organizations without being sued. It is important to have policies in place that allow personnel to test and identify vulnerabilities in a company\u2019s cyber infrastructure without being sued because it keeps the company, employees, and customers safer than without the tests. The reason why they have these policies as well is to make sure these tests are done with consent of the company in order to improve the infrastructure, instead of just trying to harm the company. It also states that there could have been multiple bugs that just weren\u2019t allowed to be mentioned because of the fear of being sued.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/2024\/04\/01\/week-12-journal-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":26016,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/posts\/350"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/users\/26016"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/comments?post=350"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/posts\/350\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/posts\/350\/revisions\/351"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/media?parent=350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/categories?post=350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/tags?post=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}