Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Security Evolution - Bug Bounty Programs for Web Applications

LASCON via YouTube

Overview

Explore the evolution of web application security through bug bounty programs in this 37-minute conference talk by Michael Coates from Mozilla at LASCON 2012. Delve into the history, types, and characteristics of bug bounty programs, understanding their importance in enhancing cybersecurity. Learn about Mozilla's bug bounty program, including issue types, payouts, and qualifying bugs. Gain insights into the benefits, lessons learned, and ethical considerations surrounding these programs. Address common concerns such as cost, attacker motivation, and potential duplication of internal work. Discover how bug bounties complement existing security measures and prepare organizations for implementing successful programs.

Syllabus

Introduction
Web Bounty Programs
History of Bug Bounty Programs
Types of Bug Bounty Programs
General Characteristics of Bug Bounty Programs
Why Launch a Bug Bounty Program
Mozilla Bug Bounty Program
Types of Issues
Issues found
How much Mozilla paid out
Bugs that qualify
Bug Bounty Graph
Benefits
Lessons Learned
What would you say
Why do you do this
Bug bounties are enhancement
Prepare
Do Anything
Encourages Attackers
Cost
Attackers
Duplicate Internal Work
Black Market
Ethical Considerations
Wrap Up
Good Questions

Taught by

LASCON

Reviews

Start your review of Security Evolution - Bug Bounty Programs for Web Applications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.