{"id":64,"date":"2023-04-04T17:55:02","date_gmt":"2023-04-04T17:55:02","guid":{"rendered":"https:\/\/student.wp.odu.edu\/apine006\/?p=64"},"modified":"2023-04-04T17:55:02","modified_gmt":"2023-04-04T17:55:02","slug":"cyse-201s-bug-bounty-principles-attention-can-be-brought-to-one-type-of-policy-known-as-bug-bounty-policies-these-policies-pay-individuals-for-identifying-vulnerabilities-in-a-companys-cyber","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/apine006\/2023\/04\/04\/cyse-201s-bug-bounty-principles-attention-can-be-brought-to-one-type-of-policy-known-as-bug-bounty-policies-these-policies-pay-individuals-for-identifying-vulnerabilities-in-a-companys-cyber\/","title":{"rendered":"CYSE 201S &#8211; Bug Bounty Principles &#8211;  Attention can be brought to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company&#8217;s cyber infrastructure. To identify vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost\/benefit principles. Read the article &#8220;Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties&#8221;. Write a summary reaction to the use of the policies, focus primarily on the literature review and the discussion of the findings."},"content":{"rendered":"\n<p>Bug bounty policies have become an increasingly popular approach for companies to address cybersecurity concerns. These policies incentivize ethical hackers, also known as white-hat hackers, to identify vulnerabilities within a company&#8217;s cyber infrastructure by offering monetary rewards. As highlighted in the referenced article, the proponents of bug bounty programs argue that they are cost-effective for organizations to improve their security posture.<\/p>\n\n\n\n<p><br>The article presents an empirical study on bug bounties. The findings offer valuable insights into the effectiveness of these policies and their impact on cybersecurity. One of the key findings from the study is that security researchers have a price elasticity of supply between 0.1 and 0.2 at the median. This indicates that ethical hackers are primarily motivated by non-monetary factors, suggesting that companies with limited financial resources can still benefit from implementing bug bounty programs. This observation aligns with the broader understanding of the hacker community, where factors such as intellectual challenge, skill development, and peer recognition often play significant roles in driving their behavior.<br>The study also finds that a company&#8217;s revenue and brand profile do not economically impact the number of valid security vulnerability reports its bug bounty program receives. This finding is particularly relevant for smaller companies and startups, suggesting that their bug bounty programs can be just as effective as those of larger, more established organizations.<\/p>\n\n\n\n<p><br>The findings suggest that these policies can benefit companies of various sizes and sectors, irrespective of their financial capabilities. Additionally, the study highlights the importance of understanding the motivations of ethical hackers and the factors that influence the success of bug bounty programs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bug bounty policies have become an increasingly popular approach for companies to address cybersecurity concerns. These policies incentivize ethical hackers, also known as white-hat hackers, to identify vulnerabilities within a company&#8217;s cyber infrastructure by offering monetary rewards. As highlighted in &hellip; <a href=\"https:\/\/student.wp.odu.edu\/apine006\/2023\/04\/04\/cyse-201s-bug-bounty-principles-attention-can-be-brought-to-one-type-of-policy-known-as-bug-bounty-policies-these-policies-pay-individuals-for-identifying-vulnerabilities-in-a-companys-cyber\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":24679,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/apine006\/wp-json\/wp\/v2\/posts\/64"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/apine006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/apine006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/apine006\/wp-json\/wp\/v2\/users\/24679"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/apine006\/wp-json\/wp\/v2\/comments?post=64"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/apine006\/wp-json\/wp\/v2\/posts\/64\/revisions"}],"predecessor-version":[{"id":65,"href":"https:\/\/student.wp.odu.edu\/apine006\/wp-json\/wp\/v2\/posts\/64\/revisions\/65"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/apine006\/wp-json\/wp\/v2\/media?parent=64"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/apine006\/wp-json\/wp\/v2\/categories?post=64"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/apine006\/wp-json\/wp\/v2\/tags?post=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}