{"id":451,"date":"2023-11-03T03:49:58","date_gmt":"2023-11-03T03:49:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rknap004\/?p=451"},"modified":"2023-11-03T03:49:58","modified_gmt":"2023-11-03T03:49:58","slug":"cyse-201s-journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rknap004\/2023\/11\/03\/cyse-201s-journal-entry-13\/","title":{"rendered":"CYSE 201S- Journal Entry #13"},"content":{"rendered":"\n<p><strong>Q: A later module addresses cybersecurity policy through a social science framework.\u00a0 At this point, attention can be drawn to one type of policy, known as bug bounty policies.\u00a0 These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read <a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\">this <\/a>article <a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true<\/a> and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/strong>\u00a0<\/p>\n\n\n\n<p>A: Essentially, the following article debates about a business policy called \u201cbug bounty\u201d, in which ethical hackers are implemented within a business to test the vulnerabilities of a business by using the same tools and techniques that a real attacker would use in a cyber attack. Currently, there\u2019s a lot of controversy surrounding ethical hackers and the business behind them. For instance, hiring ethical hackers has a huge benefit because they utilize real methods to attack the organization for the sole purpose of identifying the vulnerabilities of the cyber system, creating a real-world situation that the company can use to strengthen their cybersecurity. However, the downside with individual ethical hackers is that there\u2019s a lot of trust that must be placed into them to perform their job and respect the businesses privacy policies, since they\u2019re still technically attacking the organization and have knowledge of their vulnerabilities and what information is the most at risk to cyber attacks. Plus, there\u2019s other factors to consider based on the situation, like private vs public programs, how much access the hacker is allowed within the business to attempt to exploit, the reliability of the hackers, etc. From the research done, bug bounty policies seem like a good solution to knowing for sure if your cybersecurity system is secure and how well it performs in a real attack, with the only downside coming from a few trust issues and the perception of \u201cprofessional hackers\u201d in general.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Q: A later module addresses cybersecurity policy through a social science framework.\u00a0 At this point, attention can be drawn to one type of policy, known as bug bounty policies.\u00a0 These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rknap004\/2023\/11\/03\/cyse-201s-journal-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":24879,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts\/451"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/users\/24879"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/comments?post=451"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts\/451\/revisions"}],"predecessor-version":[{"id":452,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts\/451\/revisions\/452"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/media?parent=451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/categories?post=451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/tags?post=451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}