{"id":101,"date":"2025-04-06T17:35:41","date_gmt":"2025-04-06T17:35:41","guid":{"rendered":"https:\/\/student.wp.odu.edu\/ptuni001\/?p=101"},"modified":"2025-04-27T15:38:13","modified_gmt":"2025-04-27T15:38:13","slug":"journal-13","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/ptuni001\/2025\/04\/06\/journal-13\/","title":{"rendered":"Journal 13"},"content":{"rendered":"\n<p><strong>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article\u00a0<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/strong><\/p>\n\n\n\n<p>The article about bug bounty programs using HackerOne data shows how these programs help companies find security issues by paying freelance hackers. Even though they get paid, most hackers do it for other reasons like gaining experience or building a reputation. The study shows that even small or less popular companies can benefit from bug bounties, which makes them a good option for businesses without large budgets. The article points out that older programs get fewer bug reports unless they add more things for hackers to test, so while bug bounties are helpful and cheaper than hiring full-time staff, they\u2019re not a perfect solution and don\u2019t catch everything. There&#8217;s still a lot that\u2019s not fully understood about how these programs work, but they\u2019re a good tool to have as part of a company\u2019s security plan.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 &hellip; <a href=\"https:\/\/student.wp.odu.edu\/ptuni001\/2025\/04\/06\/journal-13\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":30342,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":4},"categories":[4,10],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/ptuni001\/wp-json\/wp\/v2\/posts\/101"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/ptuni001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/ptuni001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ptuni001\/wp-json\/wp\/v2\/users\/30342"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ptuni001\/wp-json\/wp\/v2\/comments?post=101"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/ptuni001\/wp-json\/wp\/v2\/posts\/101\/revisions"}],"predecessor-version":[{"id":102,"href":"https:\/\/student.wp.odu.edu\/ptuni001\/wp-json\/wp\/v2\/posts\/101\/revisions\/102"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/ptuni001\/wp-json\/wp\/v2\/media?parent=101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ptuni001\/wp-json\/wp\/v2\/categories?post=101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ptuni001\/wp-json\/wp\/v2\/tags?post=101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}