journal 13

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.  The policies relate to economics in that they are based on cost/benefits principles.  Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

The writing survey presents a convincing case for the viability of bug abundance programs in improving online protection for associations, particularly little and medium ventures (SMEs) that face critical difficulties in selecting network safety ability. It features two principal reasonings: the commonsense need to address the worldwide deficiency of network protection experts and the hypothetical structure of Linus’ Regulation, which places that more assorted members (i.e., independent programmers) lead to additional weaknesses being found. The discoveries, upheld by experimental information, highlight that bug bounties are especially gainful for SMEs that can’t rival bigger firms for ability and assets. The conversation of variables impacting the quantity of reports, for example, program age, industry, abundance sum, and time to goal, offers a nuanced comprehension of the elements that shape program achievement. Generally speaking, the article contributes important experiences into the developing job of publicly supported online protection, especially for associations with restricted inner assets. The observational methodology reinforces the cases made in the writing.