{"id":355,"date":"2024-12-06T04:06:41","date_gmt":"2024-12-06T04:06:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tristancole\/?page_id=355"},"modified":"2024-12-06T05:04:37","modified_gmt":"2024-12-06T05:04:37","slug":"journal-entry-13","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/tristancole\/journal-entry-13\/","title":{"rendered":"Journal Entry # 13"},"content":{"rendered":"\n<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article\u00a0<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.&nbsp;The policies relate to economics in that they are based on cost\/benefits principles. Read this article&nbsp;<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.<\/a>&nbsp; and write a summary reaction to the use of the policies in your journal.&nbsp; Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<p>&#8220;Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties&#8221; by Kiran Sridhar and Ming Ng examines how bug bounty programs work and their impact. The article review shows how cybersecurity practices have changed and focuses on the cost-effectiveness of bug bounties versus conventional methods. The article also shows the benefits of these programs when it comes to finding and fixing security vulnerabilities. Sridhar and Ng discovered that ethical hackers are spurred by more than just money. Because of smaller budgets, companies benefit from research drive the challenge of potential professional recognition. Size or revenue does not significantly impact the number of reported vulnerabilities which is beneficial for smaller companies. There is a need for Clear vulnerability policies (VDPs). Researchers hesitate to report issues because of legal concerns. Companies that have VDPs have transparent environments that urge researchers to report problems without fear of reprisal.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tristancole\/journal-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":29586,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tristancole\/wp-json\/wp\/v2\/pages\/355"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tristancole\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tristancole\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tristancole\/wp-json\/wp\/v2\/users\/29586"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tristancole\/wp-json\/wp\/v2\/comments?post=355"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/tristancole\/wp-json\/wp\/v2\/pages\/355\/revisions"}],"predecessor-version":[{"id":398,"href":"https:\/\/sites.wp.odu.edu\/tristancole\/wp-json\/wp\/v2\/pages\/355\/revisions\/398"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tristancole\/wp-json\/wp\/v2\/media?parent=355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}