{"id":320,"date":"2025-04-30T02:03:31","date_gmt":"2025-04-30T02:03:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/?p=320"},"modified":"2025-04-30T02:03:31","modified_gmt":"2025-04-30T02:03:31","slug":"week-12-journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/2025\/04\/30\/week-12-journal-entry-13\/","title":{"rendered":"Week 12 Journal Entry 13"},"content":{"rendered":"\n<p><strong>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article\u00a0<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true<\/a> and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/strong><\/p>\n\n\n\n<p>The article gave the history and overview of bug bounties.\u00a0 A lot of major companies have used this as a resource to identify vulnerabilities and enhance its security. This protects their assets as well as the personal data of consumers. If a hacker is able to identify a weakness in a system, then they receive incentives and it helps strengthen the company\u2019s security overall. Bug bounties are a very beneficial aspect of an organization&#8217;s security system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/2025\/04\/30\/week-12-journal-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":30517,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/posts\/320"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/users\/30517"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/posts\/320\/revisions"}],"predecessor-version":[{"id":321,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/posts\/320\/revisions\/321"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/media?parent=320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/categories?post=320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/tags?post=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}