{"id":264,"date":"2024-04-01T01:55:20","date_gmt":"2024-04-01T01:55:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/?p=264"},"modified":"2024-04-01T01:55:32","modified_gmt":"2024-04-01T01:55:32","slug":"cyse201s-spring-24-week-12-journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/2024\/04\/01\/cyse201s-spring-24-week-12-journal-entry-13\/","title":{"rendered":"CYSE201S Spring 24: Week 12 \u2013 Journal Entry 13"},"content":{"rendered":"\n<p>Instruction: \u00a0Read this article\u00a0<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings. <\/p>\n\n\n\n<p>Response: The findings of bug bounties impacts, effectiveness and overall assessment of the method was hard to determine due to how new the concept is. These ethical hackers finding vulnerabilities in IT systems to report in a white hat hacking manner (pentesting) allows these hackers to earn monetary prizes through bounties. It is a concept that I believe is exciting for young and aspiring people within the field and the tool is just in its beginning stages. Scope, pay and engagement are factors to consider altering in the future one way or another and continue to be useful to companies of all sizes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instruction: \u00a0Read this article\u00a0https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings. Response: The findings of bug bounties&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/2024\/04\/01\/cyse201s-spring-24-week-12-journal-entry-13\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28476,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/posts\/264"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/users\/28476"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/comments?post=264"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/posts\/264\/revisions"}],"predecessor-version":[{"id":265,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/posts\/264\/revisions\/265"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/media?parent=264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/categories?post=264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring24\/wp-json\/wp\/v2\/tags?post=264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}