{"id":361,"date":"2024-12-07T21:10:28","date_gmt":"2024-12-07T21:10:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/?p=361"},"modified":"2024-12-07T21:10:28","modified_gmt":"2024-12-07T21:10:28","slug":"journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/2024\/12\/07\/journal-entry-13\/","title":{"rendered":"Journal Entry 13"},"content":{"rendered":"\n<p>Assignment Description: &#8220;A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost\/benefits principles. Read this article <a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true<\/a> and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.&#8221;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>The overall understanding I gained from the article is that bug bounty policies are a promising new area for cybersecurity issue detections for companies of all sizes and industries. Between the article&#8217;s points that hackers are price insensitive and industry type not having a statistically significant change in reported bugs, I believe it when the article mentions that \u201cGartner projects that by 2022, 50% of enterprises will employ crowdsourced cybersecurity.\u201d Something I\u2019ve heard a lot in recent years is that companies should begin a more diverse crowd of cybersecurity employees rather than just people that follow the typical college and career path, and I think the rise of bug hunting policies will be a major step in changing that. I think these policies will be especially important and more popular in smaller companies that can\u2019t afford a great cybersecurity team but can afford to pay out the cheaper prices for freelance bug-hunters.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Assignment Description: &#8220;A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jacobhenderson\/2024\/12\/07\/journal-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":29688,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":7},"categories":[7],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/posts\/361"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/users\/29688"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/comments?post=361"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/posts\/361\/revisions"}],"predecessor-version":[{"id":362,"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/posts\/361\/revisions\/362"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/media?parent=361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/categories?post=361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/tags?post=361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}