{"id":66,"date":"2024-08-05T01:06:28","date_gmt":"2024-08-05T01:06:28","guid":{"rendered":"https:\/\/student.wp.odu.edu\/atrev004\/?p=66"},"modified":"2024-08-05T01:06:28","modified_gmt":"2024-08-05T01:06:28","slug":"module-11-journal-entry-2","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/atrev004\/2024\/08\/05\/module-11-journal-entry-2\/","title":{"rendered":"MODULE 11 JOURNAL ENTRY 2"},"content":{"rendered":"\n<p>Alexander Trevino<br>Professor Umphlet<br>CYSE201S<br>Due: July 21, 2024<br>MODULE 11 JOURNAL ENTRY 2<br>The article on bug bounty policies examines how companies use ethical hackers to find<br>weaknesses in their cyber systems. By paying hackers to find problems before bad actors exploit<br>them, companies can save money and improve security. This approach is based on the economic<br>principle of cost-benefit analysis, where the benefits of finding and fixing vulnerabilities early<br>outweigh the costs of running the program.<br>Several benefits of bug bounty programs are highlighted. One advantage is accessing a<br>wide range of hacker skills, often finding vulnerabilities that in-house teams might miss. These<br>programs also encourage quick discovery and fixing of security issues due to their competitive<br>nature. Ethical hackers, motivated by rewards, work diligently to identify security flaws, leading<br>to more secure systems.<br>However, there are challenges. Running these programs can be costly and time-<br>consuming, as it takes resources to check and fix the reported problems. Companies need<br>dedicated teams to manage the influx of reports and verify their validity. Ethical hackers might<br>feel unappreciated if their work isn&#8217;t properly rewarded, potentially leading them to unethical<br>behavior. The large number of reports, including many low-quality ones, can overwhelm security<br>teams, making it hard to focus on critical issues.<br>In conclusion, bug bounty policies are a smart way to improve cybersecurity by using the<br>skills of many hackers to find and fix problems early. Although challenging to manage, the<br>Trevino2<br>benefits, like better security and cost savings, make them a valuable part of a strong<br>cybersecurity strategy. Companies that effectively manage bug bounty programs can enhance<br>their security and protect their digital assets.<br>Trevino3<br>References<br>Ransbotham, S., &amp; Mitra, S. (2021). Are bug bounty programs worth it? Journal of<br>Cybersecurity, 7(1). Retrieved from<br>https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alexander TrevinoProfessor UmphletCYSE201SDue: July 21, 2024MODULE 11 JOURNAL ENTRY 2The article on bug bounty policies examines how companies use ethical hackers to findweaknesses in their cyber systems. By paying hackers to find problems before bad actors exploitthem, companies can save&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/atrev004\/2024\/08\/05\/module-11-journal-entry-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26774,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/66"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/users\/26774"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/comments?post=66"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/66\/revisions"}],"predecessor-version":[{"id":67,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/66\/revisions\/67"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/media?parent=66"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/categories?post=66"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/tags?post=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}