The article references policy strategies that could be implemented to regulate “ethical hacking” or “white hat hacker”, that seek to bug bounty. An activity where an individual uses their skills of penetration testing to identify and sometimes notify the organization that a vulnerability is present within a system. Although some can see it as helpful with the ability to better protect a network and its resources, others take any infiltration without explicit permission regardless of the intent helpful or not as malicious intent. With my belief in the protection of a persons data, seeking a bug bounty should be something that can be further implemented into the norm with an understanding that policy can be used to protect the organization just as much as the white hat hacker.
Read the article and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings. (Week 12-2)
on April 6, 2025
with
No Comments
Leave a Reply