Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true Links to an external site. and write a summary reaction to the use of the bug bounty policies in your journal. Focus primarily on the literature review and the discussion of the findings.
I think the implementation of bug bounty policies within organizations is a useful tool for identifying weaknesses within cyber infrastructure. Having more outside people examine the digital security of a company is effective as not everyone operates the same, especially in regards to cybersecurity. There are numerous methods of cyber threats and data breach tactics, so it’s highly important to have as many people as possible try to test the security of a company’s digital assets in order to pinpoint any unobserved vulnerabilities. This article finds that bug bounty policies are beneficial for companies of all sizes, as well as white hat hackers of all levels of experience because they are able to obtain more knowledge regarding cybersecurity and build a reputation for themselves by working in bug bounty markets.