Read the article and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings. (Week 12-2)
The article references policy strategies that could be implemented to regulate “ethical hacking” or “white hat hacker”, that seek to bug bounty. An activity where an individual uses their skills of penetration testing to identify and sometimes notify the organization … Read More