{"id":440,"date":"2024-11-13T21:39:42","date_gmt":"2024-11-13T21:39:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alzendys-cyberspace\/?page_id=440"},"modified":"2024-11-13T21:48:13","modified_gmt":"2024-11-13T21:48:13","slug":"journal-entry13","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/alzendys-cyberspace\/journal-entry13\/","title":{"rendered":"journal entry#13"},"content":{"rendered":"\n<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article <a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true Links to an external site.<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<p>The articles review of literature delves into how bug bounty programs help bridge the cybersecurity gap, within resource limitations. It suggests that such policies provide a cost method by utilizing hackers to pinpoint vulnerabilities and thereby reducing potential cyberattack expenses. Nevertheless issues arise in managing incentive schemes guarantee quality contributions and sustaining a bond between hackers and firms. Bug bounties align incentives, with heightened security measures encouraging risk handling while necessitating precise policy planning to optimize security and benefits.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/alzendys-cyberspace\/journal-entry13\/\">Read More<\/a><\/div>\n","protected":false},"author":25816,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alzendys-cyberspace\/wp-json\/wp\/v2\/pages\/440"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alzendys-cyberspace\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alzendys-cyberspace\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alzendys-cyberspace\/wp-json\/wp\/v2\/users\/25816"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alzendys-cyberspace\/wp-json\/wp\/v2\/comments?post=440"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/alzendys-cyberspace\/wp-json\/wp\/v2\/pages\/440\/revisions"}],"predecessor-version":[{"id":446,"href":"https:\/\/sites.wp.odu.edu\/alzendys-cyberspace\/wp-json\/wp\/v2\/pages\/440\/revisions\/446"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alzendys-cyberspace\/wp-json\/wp\/v2\/media?parent=440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}