Instruction:  Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

Response: The findings of bug bounties impacts, effectiveness and overall assessment of the method was hard to determine due to how new the concept is. These ethical hackers finding vulnerabilities in IT systems to report in a white hat hacking manner (pentesting) allows these hackers to earn monetary prizes through bounties. It is a concept that I believe is exciting for young and aspiring people within the field and the tool is just in its beginning stages. Scope, pay and engagement are factors to consider altering in the future one way or another and continue to be useful to companies of all sizes.