{"id":249,"date":"2024-04-01T01:39:12","date_gmt":"2024-04-01T01:39:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/?p=249"},"modified":"2024-04-01T01:39:12","modified_gmt":"2024-04-01T01:39:12","slug":"week-12-journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/2024\/04\/01\/week-12-journal-entry-13\/","title":{"rendered":"Week 12 Journal Entry 13"},"content":{"rendered":"\n<p class=\"has-vivid-cyan-blue-to-vivid-purple-gradient-background has-text-color has-background has-link-color has-small-font-size wp-elements-2f9230421a9eb40c20637b0d09fbffd7\" style=\"color:#150202\">A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try exploring the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-to-vivid-purple-gradient-background has-text-color has-background has-link-color wp-elements-8ac9f1ae97263b12f37a68494ca584d3\" style=\"color:#1b0b0b\">The article talks about the vital role of bug bounty programs in harnessing the collective expertise of hackers to uncover software vulnerabilities. It goes into the challenges posed by endogeneity in prior research. Also, bug bounties appear to offer benefits to companies of varying sizes. Additionally, it suggests that hackers may not be significantly influenced by changes in bounty amounts, hinting at the presence of other motivating factors beyond financial incentives. The study emphasizes the critical role of bug bounty programs in bolstering cybersecurity efforts and advocates for further exploration to optimize their efficacy in addressing software vulnerabilities. It notes that while the introduction of new bug bounty programs each month has a negligible impact on the number of reports received by companies, older programs tend to attract fewer valid reports over time.<\/p>\n\n\n\n<p class=\"has-black-color has-vivid-cyan-blue-to-vivid-purple-gradient-background has-text-color has-background has-link-color wp-elements-dabe7c19bf3f52b96f4c3ff64c859ec7\">The review and findings stress the key role of bug bounty programs in boosting cybersecurity by involving hackers. They underline the need to tackle research challenges and offer insights into hacker involvement and program age&#8217;s effect on bug reports. In summary, this highlights the importance of bug bounty programs and the ongoing need for research to improve their effectiveness in identifying and addressing software vulnerabilities.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/2024\/04\/01\/week-12-journal-entry-13\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28280,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/posts\/249"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/users\/28280"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/comments?post=249"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/posts\/249\/revisions"}],"predecessor-version":[{"id":250,"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/posts\/249\/revisions\/250"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/media?parent=249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/categories?post=249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s202320spr24\/wp-json\/wp\/v2\/tags?post=249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}