chapter 18 case study
When General Motors (GM) decided to start a bug bounty programpaying hackers to find computer bugs in the companys information systemsthey purposely tried to avoid other companies mistakes with such programs. Uber ended up paying hackers more than ten times the amount that they had originally allotted, partly to avoid hackers destroying customer data they had downloaded. Uber made changes to their bug bounty program after that, making it more clear what hackers should not do. Ubers experience showed the potential problems that can occur when hackers try to profit from the problems they find.
GM didnt want to face the challenges involved in overpaying, underpaying, or getting into arguments whether a payment was deserved for its bounty hackers. In fact, GM didnt pay bounty hackers at all at first. During the first stage in the GM program, hackers who reported bugs were given a direct link to GMs security team. Having that reporting system in place sent the message to hackers that the company was serious about security, said Jeff Massimilla, a GM cybersecurity executive. After two years of building relationships with hackers, GM started paying for bugs. Just two years later, the select group of hackers in the companys bug bounty program had found 700 bugs.
GMs bug bounty program is only one part of its three-prong approach to cybersecurity. What are the other prongs? Their staff includes twenty-five to thirty white hat hackers who sometimes are called ethical hackers. White hat hackers work focuses on ensuring that a companys information systems arent subject to security breaches. GM also works with third-party companies that hire more white hat hackers. They have to use the bounty program and third-party companies in addition to full-time internal hackers, since there is a shortage of white hat hackers.
White hat hackers not only need technical skills, but they also need to be trusted to work for the benefit of the companies that employ them. People with hacking skills often would rather not work for just one company and like flexibility and working from home. GMs three-prong approach also was designed to catch more bugs. If you have so many different perspectives coming together, its very different than having your own internal hackers who are all probably trained using the same processes, said Massimilla.
Case Questions
1.Bug bounty programs and hiring white hat hackers are forms of information controls. What are other forms of information controls mentioned in the chapter?
2.When a bug is found through a bug bounty program, do you think managers are more likely to take immediate corrective action or basic corrective action? What are the reasons for your answer?
3.What are the dangers versus the benefits of hiring hackers? Why have companies decided that there are more benefits than dangers in accomplishing the process of controlling via hiring hackers?
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.