{"id":243,"date":"2024-04-04T01:06:33","date_gmt":"2024-04-04T01:06:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/slgportfolio\/?page_id=243"},"modified":"2024-04-04T01:24:45","modified_gmt":"2024-04-04T01:24:45","slug":"journal-entry-13","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/slgportfolio\/journal-entry-13\/","title":{"rendered":"Journal Entry 13"},"content":{"rendered":"\n<p>Sam Garden 4\/3\/24<\/p>\n\n\n\n<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article\u00a0<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<p>Seeing that, according to HackerOne, 93% of companies in the Forbes Global 200 lack vulnerability disclosure policies. These policies are important for allowing security to submit bugs to organizations without the risk of being sued. Having these policies in place ensure the companies safety from economic damages. This also keeps customers safe. These policies are in place to ensure that these tests are conducted with the company&#8217;s permission in an effort to enhance the infrastructure rather than merely to do harm to the business. It also claims that there may have been other bugs that were simply forbidden from being discussed for fear of legal consequences.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sam Garden 4\/3\/24 A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/slgportfolio\/journal-entry-13\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":28161,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/slgportfolio\/wp-json\/wp\/v2\/pages\/243"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/slgportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/slgportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/slgportfolio\/wp-json\/wp\/v2\/users\/28161"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/slgportfolio\/wp-json\/wp\/v2\/comments?post=243"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/slgportfolio\/wp-json\/wp\/v2\/pages\/243\/revisions"}],"predecessor-version":[{"id":251,"href":"https:\/\/sites.wp.odu.edu\/slgportfolio\/wp-json\/wp\/v2\/pages\/243\/revisions\/251"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/slgportfolio\/wp-json\/wp\/v2\/media?parent=243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}