{"id":218,"date":"2023-11-21T22:08:46","date_gmt":"2023-11-21T22:08:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/?p=218"},"modified":"2023-11-21T22:08:48","modified_gmt":"2023-11-21T22:08:48","slug":"journal-entry-thirteen-bug-bounty","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/2023\/11\/21\/journal-entry-thirteen-bug-bounty\/","title":{"rendered":"Journal Entry Thirteen-Bug Bounty"},"content":{"rendered":"\n<p>This article covers the use of bug bounty policies by companies and organizations to identify vulnerabilities within their networks. These policies aren\u2019t used by all organizations for fear of legal action but companies of all sizes have found them to be useful. Linus\u2019s Law was referenced in the article as it essentially means that the more eyes you have looking for a problem, the better odds you have of finding it. Most ethical hackers have different skill sets in addition to their specific strengths and weaknesses. This allows the companies paying for said \u201cbug bounties\u201d to receive a wide range of input from multiple sources for a relatively small amount of money. The average cost per bounty is $800. Overall, bug bounty policies are a useful tool for businesses both small and large.<\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"excerpt\">This article covers the use of bug bounty policies by companies and organizations to identify vulnerabilities within their networks. These policies aren\u2019t used by all organizations for fear of legal action but companies of all sizes have found them to be useful. Linus\u2019s Law was referenced in the article as it essentially means that the more eyes you have looking&hellip; <a href=\"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/2023\/11\/21\/journal-entry-thirteen-bug-bounty\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":26115,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/posts\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/users\/26115"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/posts\/218\/revisions"}],"predecessor-version":[{"id":219,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/posts\/218\/revisions\/219"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/media?parent=218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/categories?post=218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/tags?post=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}