Journal 11-Bug Bounty Policies
The use of the policies allowed for penetration testers to be able to efficiently test for vulnerabilities. The policies are used to analyze and detect specific errors within IT systems and cybersecurity networks. The companies would participate in detecting these codes and report them back to the systems so they can be properly analyzed and fixed. The security individuals would “hack” into systems to test for these vulnerabilities and then report them as detected vulnerabilities. These bug bounty policies are put in place to save small and large businesses from suffering a major breach from happening, allowing for them to quickly assess the issues after.