Description |
-
The field of cybersecurity has grown extensively over the past two decades, with high-profile incidents leading directly to new practices designed to best protect digital systems. Although many organizations rely on in-house expertise to defend against threats, security researchers maintain a variety of best-practices for disclosing vulnerability information to maintainers of major services. Despite ... read moregood intentions, some individuals have encountered legal resistance from organizations unaware of their own systems' flaws. This thesis examines the implementation of two high-profile bug bounty programs to understand how they succeed (and fail) at creating "safe harbors" for security researchers. Drawing from the STS sub-discipline of Infrastructure Studies, it relies on historical case studies to build a framework for understanding bug bounty programs as a form of maintenance on digital infrastructures.
Thesis (B.S.)--Tufts University, 2021.
Submitted to Science, Technology, and Society.read less
|
This object is in collection