CYSE201S Journal Entry (13) Bug Bounty Policies

Journal entry — Bug Bounty Policies
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try to explore the cyberinfrastructure using their penetration testing skills. The policies are related to economics in that they are based on cost/benefits principles. Read this article
https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the
discussion of the findings.

After reading through the provided article I find the additional big bounty policies to be very efficient. Bug bounty policies provide a low-cost method of getting cyber help and increase the security that is had by a network or company. For example, if a small company does not have the resources to hire a cybersecurity team or faction this is a wonderful solution until they are able to grow the needed department.
Bug bounty programs were very interesting to learn about and provide a wonderful addition to keeping people safe. Along with providing the opportunity for many different people from different walks of life to participate. Therefore allows for many different perspectives on the bugs that can be found and then worked out for the greater population.

Leave a Reply

Your email address will not be published. Required fields are marked *