{"id":330,"date":"2024-04-22T22:59:01","date_gmt":"2024-04-22T22:59:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tks-123\/?p=330"},"modified":"2024-04-22T22:59:01","modified_gmt":"2024-04-22T22:59:01","slug":"journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/tks-123\/2024\/04\/22\/journal-entry-13\/","title":{"rendered":"Journal Entry 13"},"content":{"rendered":"\n<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article\u00a0<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Bug bounty policies have emerged as a notable approach in cybersecurity policy, leveraging economic principles to address the ever-present challenge of identifying vulnerabilities in cyber unfractured. Through a comprehensive literature review and discussion of findings, The foundational basis of bug bounty policies lies in cost associated with cyberattacks such as data breaches, finical losses, reputational damage. This proactive approach not only serves as a preventive measure but also contributes to the overall resilience of cyber infrastructure. The literature review reveals a growing body of research exploring various aspects of bug bounty policies, including their impact on vulnerability discovery, the motivations of participating hackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tks-123\/2024\/04\/22\/journal-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":27872,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/posts\/330"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/users\/27872"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/posts\/330\/revisions"}],"predecessor-version":[{"id":342,"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/posts\/330\/revisions\/342"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/media?parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/categories?post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/tags?post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}