{"id":231,"date":"2024-04-22T16:07:01","date_gmt":"2024-04-22T16:07:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/?p=231"},"modified":"2024-04-22T16:07:01","modified_gmt":"2024-04-22T16:07:01","slug":"journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/2024\/04\/22\/journal-entry-13\/","title":{"rendered":"Journal Entry 13"},"content":{"rendered":"\n<p>Justin DeLoach<br>31 March 24<br>From my understanding the primary goal of the article was to introduce the policy of bug<br>bounties in order to help flesh out the holes in the cybersecurity framework that had<br>already been developed. By doing so they were able to identify the multiple<br>vulnerabilities and, in relation to the incentive theory, be able to be paid to essentially<br>break into the available network. There were a couple of interesting findings from the<br>article, the first being that the hackers didn&#8217;t really stretch the payment incentive that<br>was offered to them. It seemed that the hackers were generally just happy to be able to<br>go on these bug bounties in the first place. This relates to the theory that is rational<br>choice. This basically states that the reason they were not inquiring on higher pay is<br>because they were able to weigh the pros and cons of attempting to obtain the bug<br>bounties. And upon realizing that, for the gray and white hat hackers, there was no true<br>con that stopped them from wanting to exploit those vulnerabilities and retrieve payment<br>for doing so.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Justin DeLoach31 March 24From my understanding the primary goal of the article was to introduce the policy of bugbounties in order to help flesh out the holes in the cybersecurity framework that hadalready been developed. By doing so they were&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/2024\/04\/22\/journal-entry-13\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28356,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/231"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/users\/28356"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/231\/revisions"}],"predecessor-version":[{"id":232,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/231\/revisions\/232"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/media?parent=231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/categories?post=231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/tags?post=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}