{"id":383,"date":"2024-12-04T08:53:02","date_gmt":"2024-12-04T08:53:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/?page_id=383"},"modified":"2024-12-04T21:45:35","modified_gmt":"2024-12-04T21:45:35","slug":"journal-entry13","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/journal-entry13\/","title":{"rendered":"Journal entry13"},"content":{"rendered":"\n<p>The policies of\u00a0bug bounty\u00a0were\u00a0designed\u00a0to\u00a0enable white hat\u00a0hackers to identify and\u00a0reveal\u00a0the\u00a0vulnerabilities\u00a0of\u00a0the\u00a0firm&#8217;s cyber infrastructure\u00a0for\u00a0some\u00a0monetary\u00a0benefit.\u00a0It has been identified from\u00a0the literature review\u00a0of\u00a0the article\u00a0that\u00a0such\u00a0policies are driven by\u00a0the principle of\u00a0cost-benefit\u00a0analysis\u00a0and\u00a0provide\u00a0companies with a\u00a0less\u00a0expensive\u00a0manner\u00a0of\u00a0discovering\u00a0and\u00a0mitigating\u00a0vulnerabilities compared to traditional security audits. The\u00a0results\u00a0support\u00a0the fact\u00a0that bug bounty programs\u00a0indeed\u00a0harden\u00a0cybersecurity by\u00a0bringing\u00a0in\u00a0a\u00a0wide\u00a0pool of skilled\u00a0people\u00a0worldwide\u00a0and\u00a0proactively strengthen\u00a0one&#8217;s\u00a0defenses. However, challenges\u00a0range\u00a0from\u00a0clarity\u00a0over\u00a0program guidelines\u00a0down\u00a0to\u00a0management\u00a0of\u00a0volume,\u00a0considering\u00a0that\u00a0reports\u00a0received\u00a0could\u00a0strain internal resources.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The policies of\u00a0bug bounty\u00a0were\u00a0designed\u00a0to\u00a0enable white hat\u00a0hackers to identify and\u00a0reveal\u00a0the\u00a0vulnerabilities\u00a0of\u00a0the\u00a0firm&#8217;s cyber infrastructure\u00a0for\u00a0some\u00a0monetary\u00a0benefit.\u00a0It has been identified from\u00a0the literature review\u00a0of\u00a0the article\u00a0that\u00a0such\u00a0policies are driven by\u00a0the principle of\u00a0cost-benefit\u00a0analysis\u00a0and\u00a0provide\u00a0companies with a\u00a0less\u00a0expensive\u00a0manner\u00a0of\u00a0discovering\u00a0and\u00a0mitigating\u00a0vulnerabilities compared to traditional security audits. The\u00a0results\u00a0support\u00a0the fact\u00a0that bug bounty programs\u00a0indeed\u00a0harden\u00a0cybersecurity by\u00a0bringing\u00a0in\u00a0a\u00a0wide\u00a0pool of skilled\u00a0people\u00a0worldwide\u00a0and\u00a0proactively strengthen\u00a0one&#8217;s\u00a0defenses. However, challenges\u00a0range\u00a0from\u00a0clarity\u00a0over\u00a0program guidelines\u00a0down\u00a0to\u00a0management\u00a0of\u00a0volume,\u00a0considering\u00a0that\u00a0reports\u00a0received\u00a0could\u00a0strain internal resources.<\/p>\n","protected":false},"author":29547,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/pages\/383"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/users\/29547"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/comments?post=383"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/pages\/383\/revisions"}],"predecessor-version":[{"id":395,"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/pages\/383\/revisions\/395"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/media?parent=383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}