Publication | Closed Access
Bug Bounty Programs for Cybersecurity: Practices, Issues, and Recommendations
49
Citations
13
References
2019
Year
Software MaintenanceEngineeringUsable SecurityInformation SecuritySoftware EngineeringCyber Security EngineeringCommunicationSoftware AnalysisCrowd EngagementMainstream Security PracticeManagementBug Bounty ProgramsSecurity ManagementSecure By DesignComputer ScienceCrowdsourcingData SecurityInformation Security ManagementSoftware TestingSocial ComputingSecurityCybersecurity System
Drawing upon crowdsourcing, bug bounty programs (BBPs) are entering the mainstream security practice in organizations. We analyze and recommend best practices in five main BBP areas: scoping of BBPs, timing of crowd engagement, submission quality, firm-researcher communication, and hacker motivation.
| Year | Citations | |
|---|---|---|
Page 1
Page 1