The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Data Leakage and Privacy Concerns in Public Bug Bounty Platforms
Abstract
For long-term relationships, the websites of various businesses store the PII and PHI of customers, which are mainly targeted by hackers. Cyber breaches mainly result in lack of customer trust and downfall of the business reputation. As a result, the customers become reluctant to share PII and PHI with online businesses until provided with the protection of sensitive data. The online resources of a business need to be in compliance with GDPR and PCI DSS. Companies undergo penetration testing of the infrastructure; for this, paid white hat hackers are hired under a legal contract. The companies also adopt RVDP program, where the Bug Bounty Platforms is one of the variants of RVDP. Security researchers are rewarded with an amount of bounty in the form of money or name in the hall of fame at official website for bugs' identification. Ideally, the security researcher would perform cyber security assessment. The vulnerabilities would be reported to intended stakeholders and the remediation measures with great deal of care so that PII and PHI won't be exploited by anyone.
Related Content
Mohib Ullah, Arbab Waseem Abbas, Lala Rukh, Kamran Ullah, Muhammad Inam Ul Haq.
© 2023.
25 pages.
|
Rafi Ullah Khan, Mohib Ullah, Bushra Shafi, Imran Ihsan.
© 2023.
20 pages.
|
Rafi Ullah Khan, Mohib Ullah, Bushra Shafi.
© 2023.
17 pages.
|
Shaukat Ali, Shah Khusro, Mumtaz Khan.
© 2023.
34 pages.
|
Tayyaba Riaz, Iftikhar Alam.
© 2023.
20 pages.
|
Ufuk Uçak, Gurkan Tuna.
© 2023.
22 pages.
|
Muhammad Hamad, Altaf Hussain, Majida Khan Tareen.
© 2023.
21 pages.
|
|
|