Question: Bug Bounty Hackers at General Motors When General Motors ( GM ) decided to start a bug bounty program - paying hackers to find computer
Bug Bounty Hackers at General Motors
When General Motors GM decided to start a bug bounty programpaying hackers to find computer bugs in the company's information systems they purposely tried to avoid other companies' mistakes with such programs. Uber ended up paying hackers more than ten times the amount that they had originally allotted, partly to avoid hackers destroying customer data they had downloaded. Uber made changes to their bug bounty program after that, making it more clear what hackers should not do Uber's experience showed the potential problems that can occur when hackers try to profit from the problems they find.
GM didn't want to face the challenges involved in overpaying, underpaying, or getting into arguments about whether a payment was deserved for its bounty hackers. GM didn't pay bounty hackers at all at first. During the first stage of the GM program, hackers who reported bugs were given a direct link to GMs security team. "Having that reporting system in place sent the message to hackers that the company was serious about security," said Jeff Massimilla, a GM cybersecurity executive. After two years of building relationships with hackers, GM started paying for bugs. Just two years later, the select group of hackers in the company's bug bounty program had found bugs.
GMs bug bounty program is only one part of its threepronged approach to cybersecurity. What are the other prongs? Their staff includes twentyfive to thirty "white hat hackers" who sometimes are called ethical hackers. White hat hackers' work focuses on ensuring that a company's information systems aren't subject to security breaches. GM also works with thirdparty companies that hire more white hat hackers. They must use the bounty program and thirdparty companies in addition to fulltime internal hackers since there is a shortage of white hat hackers.
White hat hackers not only need technical skills, but they also need to be trusted to work for the benefit of the companies that employ them. People with hacking skills often would rather not work for just one company and like flexibility and working from home. GMs threeprong approach also was designed to catch more bugs. If you have so many different perspectives coming together, it's very different than having your internal hackers who are all probably trained using the same processes," said Massimilla.
Discussion Questions
Bug bounty programs and hiring white hat hackers are forms of information control. What are other forms of information controls mentioned in the chapter?
When a bug is found through a bug bounty program, do you think managers are more likely to take immediate corrective action or basic corrective action? What are the reasons for your answer?
What are the dangers versus the benefits of hiring hackers? Why have companies decided that there are more benefits than dangers in accomplishing the process of controlling via hiring hackers?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
The question is complete Based on the information and discussion questions provided here are the answers 1811 Forms of Information Controls While the chapter specifically mentions bug bounty programs ... View full answer
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
