{"id":86,"date":"2025-04-06T19:13:17","date_gmt":"2025-04-06T19:13:17","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cvanc003\/?p=86"},"modified":"2025-04-06T19:13:18","modified_gmt":"2025-04-06T19:13:18","slug":"cyse-201s-week-12-journal-entry-13","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/cvanc003\/2025\/04\/06\/cyse-201s-week-12-journal-entry-13\/","title":{"rendered":"CYSE 201S \/ Week 12 &#8211; Journal Entry 13"},"content":{"rendered":"\n<p><strong>Cybersecurity and the Social Sciences (CYSE 201S)<\/strong><\/p>\n\n\n\n<p><em>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article <a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true Links to an external site.<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/em><\/p>\n\n\n\n<p>I find the use of Bug Bounty Policies in businesses to be a great thing. The more eyes you can get on a project to look for errors leads to better outcomes. I found it interesting, but not surprising, that the article mentioned that as a bug bounty program ages, it gets fewer reports unless the scope is widened. I see that as a testament to the usefulness of bug bounty programs. It\u2019s obvious that as it goes on, there are fewer reports. Assuming bugs are being fixed correctly and not introducing new bugs, then as time goes on, all bugs are going to be dealt with and it will become harder to find new ones.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and the Social Sciences (CYSE 201S) A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited &hellip; <a href=\"https:\/\/student.wp.odu.edu\/cvanc003\/2025\/04\/06\/cyse-201s-week-12-journal-entry-13\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 201S \/ Week 12 &#8211; Journal Entry 13<\/span><\/a><\/p>\n","protected":false},"author":30367,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/posts\/86"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/users\/30367"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/comments?post=86"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/posts\/86\/revisions"}],"predecessor-version":[{"id":87,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/posts\/86\/revisions\/87"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/media?parent=86"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/categories?post=86"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/tags?post=86"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}