{"id":396,"date":"2025-03-31T17:05:59","date_gmt":"2025-03-31T17:05:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ian-burd\/?p=396"},"modified":"2025-03-31T17:05:59","modified_gmt":"2025-03-31T17:05:59","slug":"cyse201-journal-entry-13-week-12","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ian-burd\/2025\/03\/31\/cyse201-journal-entry-13-week-12\/","title":{"rendered":"CYSE201 &#8211; Journal Entry 13 &#8211; Week 12"},"content":{"rendered":"\n<p>Bug Bounty Policies and Economics<\/p>\n\n\n\n<p>ARTICLE URL: <a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\">https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf<\/a><\/p>\n\n\n\n<p>Bug bounties could be extremely helpful to an organization, in more ways than one. It<br>allows them to learn about vulnerabilities they may have missed in the past. This means it can<br>significantly reduce the cost of data breaches, security training or recovery. Some bug bounties<br>can be taken up by hackers, programmers or anyone with technical knowledge outside of the<br>organization, allowing them to make extra money as well, after successfully completing a bug<br>bounty. The article explains that \u201cresults indicate that hackers are largely motivated by non-<br>monetary factors\u201d (Sridhar and Ng). These other motivations include increased recognition, or<br>more experience within the field of cybersecurity. Overall bug bounties can relate to economy,<br>both in regards to the individual hacker, and to the overall costs of security for an organization.<br><\/p>\n\n\n\n<p>References<br>Kiran Sridhar, Ming Ng, Hacking for good: Leveraging HackerOne data to develop an economic<br>model of Bug Bounties, Journal of Cybersecurity, Volume 7, Issue 1, 2021, tyab007,<br>https:\/\/doi.org\/10.1093\/cybsec\/tyab0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bug Bounty Policies and Economics ARTICLE URL: https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf Bug bounties could be extremely helpful to an organization, in more ways than one. Itallows them to learn about vulnerabilities they may have missed in the past. This means it cansignificantly reduce the cost of data breaches, security training or recovery. Some bug bountiescan be taken up&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ian-burd\/2025\/03\/31\/cyse201-journal-entry-13-week-12\/\">Read More<\/a><\/div>\n","protected":false},"author":30246,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ian-burd\/wp-json\/wp\/v2\/posts\/396"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ian-burd\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ian-burd\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ian-burd\/wp-json\/wp\/v2\/users\/30246"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ian-burd\/wp-json\/wp\/v2\/comments?post=396"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ian-burd\/wp-json\/wp\/v2\/posts\/396\/revisions"}],"predecessor-version":[{"id":397,"href":"https:\/\/sites.wp.odu.edu\/ian-burd\/wp-json\/wp\/v2\/posts\/396\/revisions\/397"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ian-burd\/wp-json\/wp\/v2\/media?parent=396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ian-burd\/wp-json\/wp\/v2\/categories?post=396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ian-burd\/wp-json\/wp\/v2\/tags?post=396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}