{"id":492,"date":"2024-11-13T07:36:12","date_gmt":"2024-11-13T07:36:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kylie-henley\/?p=492"},"modified":"2024-11-13T07:36:12","modified_gmt":"2024-11-13T07:36:12","slug":"journal-entry-13-summarize-the-following-article-on-bug-bounty-policies","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kylie-henley\/2024\/11\/13\/journal-entry-13-summarize-the-following-article-on-bug-bounty-policies\/","title":{"rendered":"Journal Entry 13 &#8211; Summarize the following article on Bug Bounty policies"},"content":{"rendered":"\n<p><em>\u201cA later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try exploring the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article\u00a0<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.\u201d<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>I found this article on Bug Bounty policies to be quite informative. The following article provided an in-depth understanding of the development of the policies that are used to find vulnerabilities within a company\u2019s cyber infrastructure. Along with discussing how effective these policies were in preventing cyber-attacks and how it helped enhance cybersecurity. I found it fascinating to learn about how these bug bounty programs aided ethical hackers when it came to identifying and reporting vulnerabilities within the company\u2019s IT systems in exchange for rewards.\u00a0<\/p>\n\n\n\n<p>Within the article, it also went over the economic principles behind the policies, explaining the role of cost-benefit analysis, when it came to determining the rewards for the ethical hackers. It also contained evidence that the bug bounty policies enhance company\u2019s cybersecurity and explained how the program has grown and become more popular for companies to use. Along with strongly recommencing companies to adopt these policies to ensure the safety of their cybers infrastructure and minimizing the risk of cyber-attacks.<\/p>\n\n\n\n<p>Overall, I found this article fascinating\u00a0and better understand how bug bounty policies allow ethical hackers to make money while also helping companies become more aware of their weaknesses within their systems.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cA later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try exploring the cyber infrastructure using&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kylie-henley\/2024\/11\/13\/journal-entry-13-summarize-the-following-article-on-bug-bounty-policies\/\">Read More<\/a><\/div>\n","protected":false},"author":29373,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/posts\/492"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/users\/29373"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/comments?post=492"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/posts\/492\/revisions"}],"predecessor-version":[{"id":493,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/posts\/492\/revisions\/493"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/media?parent=492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/categories?post=492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/tags?post=492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}