{"id":352,"date":"2024-03-28T23:52:11","date_gmt":"2024-03-28T23:52:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/calebbryant\/?p=352"},"modified":"2024-04-01T04:12:58","modified_gmt":"2024-04-01T04:12:58","slug":"week-12-journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/calebbryant\/2024\/03\/28\/week-12-journal-entry-13\/","title":{"rendered":"Week 12 &#8211; Journal Entry 13"},"content":{"rendered":"\n<p>This journal combines a literature review on all of the material and talks about bug bounty programs Cybersecurity. However, beyond the pragmatic and theoretical explanations of bug bounties, there is also empirical evidence backing up their utility. This challenges the common belief that hackers only look at prices discuss issues like the impact of these programs, and report trends relevant to managing cybersecurity; but I have to appreciate how this research work discovered &nbsp;so many areas for further studies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This journal combines a literature review on all of the material and talks about bug bounty programs Cybersecurity. However, beyond the pragmatic and theoretical explanations of bug bounties, there is also empirical evidence backing up their utility. This challenges the common belief that hackers only look at prices discuss issues like the impact of these&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/calebbryant\/2024\/03\/28\/week-12-journal-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":27571,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/posts\/352"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/users\/27571"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/comments?post=352"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/posts\/352\/revisions"}],"predecessor-version":[{"id":355,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/posts\/352\/revisions\/355"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/media?parent=352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/categories?post=352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/tags?post=352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}