{"id":226,"date":"2025-04-25T17:35:23","date_gmt":"2025-04-25T17:35:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kdent006\/?p=226"},"modified":"2025-04-25T17:35:35","modified_gmt":"2025-04-25T17:35:35","slug":"journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kdent006\/2025\/04\/25\/journal-entry-13\/","title":{"rendered":"Journal Entry 13"},"content":{"rendered":"\n<p>This article provided insight into what \u201cbug bounties\u201d are and how they are used by<br>companies to find vulnerabilities in their digital infrastructure and get it fixed after the report by<br>a freelance hacker has been submitted and the hacker rewarded for their findings. Companies use<br>these bug bounties to have these vulnerabilities found and patched, but it was found that the use<br>of the bug bounties is not equally used when it comes to certain fields. It was stated that fields<br>like finance and healthcare don\u2019t employ the use of bug bounties due to the fact that they store<br>personal identifiable information (PII) and the hacker doing the bug bounty if it were there, could<br>store and sell the PII on the black market since that is high seller on the market according to the<br>article. These bug bounties though, do have the allure of drawing in new \u201ctalent\u201d (hackers) to try<br>and grow their reputation by completing the bug bounties, but it was talked about that as they<br>grow in reputation these hackers might not have the draw to them only wanting to partake in<br>high reward bounties. These high reward bounties, could be from companies like google where<br>they keep these hackers on a retainer to employ them when they want a bug to be found. Lastly<br>the findings did show that as these programs go on with time, that they do receive fewer reports<br>as the time goes on, which can lead to these companies that use bug bounties to find<br>vulnerabilities having to source to actual cybersecurity firms to test and defend their systems,<br>from vulnerabilities, meaning they\u2019d have to spend more money into that side of their<br>cybersecurity department.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article provided insight into what \u201cbug bounties\u201d are and how they are used bycompanies to find vulnerabilities in their digital infrastructure and get it fixed after the report bya freelance hacker has been submitted and the hacker rewarded for their findings. Companies usethese bug bounties to have these vulnerabilities found and patched, but it&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kdent006\/2025\/04\/25\/journal-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":30384,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/posts\/226"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/users\/30384"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/comments?post=226"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/posts\/226\/revisions"}],"predecessor-version":[{"id":228,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/posts\/226\/revisions\/228"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/media?parent=226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/categories?post=226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/tags?post=226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}