Corporate cybersecurity : identifying risks and the bug bounty program / John Jackson.
"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, h...
Saved in:
Online Access: |
Full Text (via EBSCO) |
---|---|
Main Author: | |
Format: | eBook |
Language: | English |
Published: |
Hoboken, NJ :
John Wiley & Sons, Inc.,
2022.
|
Subjects: |
Summary: | "Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has been a word that scares the public and creates waves of fear inside of a company when rumors of a 'hack' spread. The first bounty paid for breaking into something (in recorded history) was in 1851. Charles Alfred Hobbs was paid roughly the equivalent of $20,000 US Dollars to pick a physical lock. (https://www.itspmagazine.com/itsp-chronicles/history-and-interesting-facts-about-bug-bounties-an-appsec-usa-2017-panel-recap)."-- |
---|---|
Physical Description: | 1 online resource : color illustrations |
Bibliography: | Includes bibliographical references and index. |
ISBN: | 1119782546 9781119782568 1119782562 9781119782537 1119782538 9781119782544 |
Source of Description, Etc. Note: | Description based on online resource; title from digital title page (viewed on January 06, 2022). |