{"id":315,"date":"2024-12-07T15:30:46","date_gmt":"2024-12-07T15:30:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nicholasdent\/?p=315"},"modified":"2024-12-07T15:30:46","modified_gmt":"2024-12-07T15:30:46","slug":"journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nicholasdent\/2024\/12\/07\/journal-entry-13\/","title":{"rendered":"Journal Entry 13"},"content":{"rendered":"\n<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article\u00a0<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<p>This article talks about bug bounty programs and how they are facilitated in the cyber world. These bug bounty programs&#8217; main focus are to find weak spots in security by finding different ethical hackers. To be more specific, these programs help find different bugs in company systems, as well as helping companies with finding the best of the best hackers to join them. In addition, the author introduces a strategy called the 2SLS regression strategy. The purpose of this strategy based on the author&#8217;s word is to establish causality. Some key findings that I find most important in this article are the topics of program age, price insensitivity, industry effects, and\u00a0 explained variation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nicholasdent\/2024\/12\/07\/journal-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":29537,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/posts\/315"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/users\/29537"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/comments?post=315"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/posts\/315\/revisions"}],"predecessor-version":[{"id":316,"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/posts\/315\/revisions\/316"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/media?parent=315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/categories?post=315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/tags?post=315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}