From the course: CISSP Cert Prep (2021): 6 Security Assessment and Testing

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Bug bounty

Bug bounty

- [Instructor] Bug bounty programs provide a formal process that allows organizations to open their systems to inspection by security researchers in a controlled environment that encourages attackers to report vulnerabilities in a responsible fashion. Organizations deploying a bug bounty program typically do so with the assistance of a vendor who specializes in the design, implementation, and operation of these programs. The reality of operating internet connected systems is that attackers will probe them on a virtually continuous basis. Just take a look at the logs of web servers, firewalls, and other devices with public exposure, and you'll see evidence of these continuing attacks. Some of these attacks may be targeted reconnaissance against your organization, but the vast majority are simply automated scanning tools searching the internet for vulnerable systems. These automated scans are launched by opportunistic attackers…

Contents