1.

Record Nr.

UNINA9910829852403321

Autore

Jackson John (Cybersecurity professional)

Titolo

Corporate cybersecurity : identifying risks and the bug bounty program / / John Jackson

Pubbl/distr/stampa

Hoboken, New Jersey ; ; Chichester, England : , : John Wiley & Sons, Ltd., , [2022]

©2022

ISBN

1-119-78253-8

1-119-78256-2

1-119-78254-6

Descrizione fisica

1 online resource (273 pages)

Disciplina

658.478

Soggetti

Business enterprises - Computer networks - Security measures

Penetration testing (Computer security)

Cyberspace - Security measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Sommario/riassunto

"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has been a word that scares the public and creates waves of fear inside of a company when rumors of a 'hack' spread. The first bounty paid for breaking into something (in recorded history) was in 1851. Charles Alfred Hobbs was paid roughly the equivalent of $20,000 US Dollars to pick a physical lock. (https://www.itspmagazine.com/itsp-chronicles/history-and-interesting-facts-about-bug-bounties-an-appsec-usa-2017-panel-recap)."--