{"id":341,"date":"2024-08-05T01:35:20","date_gmt":"2024-08-05T01:35:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ktomas\/?p=341"},"modified":"2024-08-05T01:35:20","modified_gmt":"2024-08-05T01:35:20","slug":"module-11-journal-entry-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ktomas\/2024\/08\/05\/module-11-journal-entry-2\/","title":{"rendered":"Module 11 Journal Entry 2"},"content":{"rendered":"\n<p>The bug bounty policies that are made because companies want to be able to know what<br>vulnerabilities are in their company.It has been mentioned that. It has been reported that most<br>companies shut down because of a breach that has been made, if they were able to scope that out<br>before it happened a lot of companies would still be here. There are companies that\u2019s whole<br>mission statement is to pay out the ethical hacker\u2019s that find the vulnerabilities, this is a new field<br>but one that is very pivotal right now because of the ever changing cyber threats that plague the<br>companies. Any company that can afford a hacker , can get one. That is one big issue for the<br>smaller companies is that the hackers that are for the hire will go for the company that will have<br>a big pay out, some researchers have learned to do multiple companies at one time, especially if<br>the company is smaller which means they are unable to afford an advanced system engineer<br>which means the code is not that advanced to look for bugs. The article explains how many<br>researchers are assigned to a company when they want a hacker to look into them. The most<br>important factor is the pay out which means that the hacker will spend more time on the<br>company that pays more. The age of the code, the newer the code there could be software that<br>scans the code and finds the issue or the bug. The article also explains how effect this policy is<br>with references from 5 different scholars.<\/p>\n\n\n\n<p>iran Sridhar, Ming Ng, Hacking for good: Leveraging HackerOne data to develop an economic<br>model of Bug Bounties, Journal of Cybersecurity, Volume 7, Issue 1, 2021, tyab007,<br>https:\/\/doi.org\/10.1093\/cybsec\/tyab007<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The bug bounty policies that are made because companies want to be able to know whatvulnerabilities are in their company.It has been mentioned that. It has been reported that mostcompanies shut down because of a breach that has been made, if they were able to scope that outbefore it happened a lot of companies would&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ktomas\/2024\/08\/05\/module-11-journal-entry-2\/\">Read More<\/a><\/div>\n","protected":false},"author":26185,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/341"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/users\/26185"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/comments?post=341"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/341\/revisions"}],"predecessor-version":[{"id":342,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/341\/revisions\/342"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/media?parent=341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/categories?post=341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/tags?post=341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}