{"id":148,"date":"2023-05-01T23:41:51","date_gmt":"2023-05-01T23:41:51","guid":{"rendered":"https:\/\/student.wp.odu.edu\/apici001\/?p=148"},"modified":"2023-05-01T23:41:51","modified_gmt":"2023-05-01T23:41:51","slug":"entry-14","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/apici001\/2023\/05\/01\/entry-14\/","title":{"rendered":"Entry #14"},"content":{"rendered":"\n<p>A later module addresses cybersecurity policy through a social science framework.\u00a0 At this point, attention can be drawn to one type of policy, known as bug bounty policies.\u00a0 These policies pay individuals to identify vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try to explore the cyberinfrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<p> Bug bounties are when ethical hackers attempt to find bugs or exploit in the code of companies that hire them in order to fix any gaps in their security. The article below discusses their efficacy, providing data on the subject. Many companies are scrambling to allow bug hunters to work without fear of being sued, but there is very little in the metrics to suggest that bug bounties significantly increase the security of a company.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A later module addresses cybersecurity policy through a social science framework.\u00a0 At this point, attention can be drawn to one type of policy, known as bug bounty policies.\u00a0 These policies pay individuals to identify vulnerabilities in a company\u2019s cyber infrastructure.\u00a0&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/apici001\/2023\/05\/01\/entry-14\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":24240,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/apici001\/wp-json\/wp\/v2\/posts\/148"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/apici001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/apici001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/apici001\/wp-json\/wp\/v2\/users\/24240"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/apici001\/wp-json\/wp\/v2\/comments?post=148"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/apici001\/wp-json\/wp\/v2\/posts\/148\/revisions"}],"predecessor-version":[{"id":149,"href":"https:\/\/student.wp.odu.edu\/apici001\/wp-json\/wp\/v2\/posts\/148\/revisions\/149"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/apici001\/wp-json\/wp\/v2\/media?parent=148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/apici001\/wp-json\/wp\/v2\/categories?post=148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/apici001\/wp-json\/wp\/v2\/tags?post=148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}