{"id":281,"date":"2024-03-30T17:02:17","date_gmt":"2024-03-30T17:02:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyber-201s\/?p=281"},"modified":"2025-11-12T20:52:57","modified_gmt":"2025-11-12T20:52:57","slug":"journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/03\/30\/journal-entry-13\/","title":{"rendered":"Journal Entry #13"},"content":{"rendered":"\n<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article\u00a0<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<p>The fact that bug bounty programs are effective in creating more secure networks comes as no surprise. A company will generally be hacked at some point or experience a cyber breach at some point. It is typical for cyber security to be a discipline that is implemented as a response to an incident. Setting up bug bounties has helped the cybersecurity industry stay one step ahead. Both companies and hackers benefit from bug bounty programs. The Bug bounty policy allows hackers to gain profits or recognition while making a company aware of weaknesses in their systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/03\/30\/journal-entry-13\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25880,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/281"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/users\/25880"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/comments?post=281"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/281\/revisions"}],"predecessor-version":[{"id":283,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/281\/revisions\/283"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/media?parent=281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/categories?post=281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/tags?post=281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}