Conceiving Effective Rules for Bug-Bounty Platforms and Security Vulnerability Detection
  • Author(s): Feyisayo Mariam Yussuf
  • Paper ID: 1707316
  • Page: 1-5
  • Published Date: 01-03-2025
  • Published In: Iconic Research And Engineering Journals
  • Publisher: IRE Journals
  • e-ISSN: 2456-8880
  • Volume/Issue: Volume 8 Issue 9 March-2025
Abstract

In a world of rising security risks, legislation and standards for protecting existing IT information and data preservation are major concerns and costs. Security and data vulnerability concern every company. Ethical and unethical hackers find and report vulnerabilities to bug bounty sites for modern security. Organizations rely on white hats, but they must constantly assess risks and rewards. Concerned institutions adopt special regulations to control white hat activity wherever they are, imposing responsibility on the participating organization like bounty levies. The quantitative study established bug bounty platform standards for system security vulnerability detection. The research explored and suggested basic security vulnerability detection criteria to detect typical system flaws. The study proposed relevant security vulnerability detection rules.

Keywords

White Hat; Ethical Hacker; Bug Bounty Platform.

Citations

IRE Journals:
Feyisayo Mariam Yussuf "Conceiving Effective Rules for Bug-Bounty Platforms and Security Vulnerability Detection" Iconic Research And Engineering Journals Volume 8 Issue 9 2025 Page 1-5

IEEE:
Feyisayo Mariam Yussuf "Conceiving Effective Rules for Bug-Bounty Platforms and Security Vulnerability Detection" Iconic Research And Engineering Journals, 8(9)