Главная
Study mode:
on
1
Introduction
2
Why am I here
3
Mozilla Bug Bounty Program
4
History of Bug Bounty Programs
5
Types of Bug Bounty Programs
6
Black Market Client Programs
7
Program Values
8
Vendor vs Black Market
9
Negative impact on reputation
10
Benefits
11
Concerns
12
Encouraging attackers
13
Attackers
14
Security Team
15
Black Market
16
Black Box
17
Bugmatic Committee
18
Web Body Process
19
Results
20
Firefox
21
Web Valve
22
Duplicate vs New Bugs
23
Cost Breakdown
24
Who Submits
25
What Next
26
Bug Bounty Program
27
What you need to do before you start
Description:
Explore the world of bug bounty programs and crowd-sourced security in this 44-minute conference talk from nullcon Goa 2013. Delve into the Mozilla bug bounty program, learning about its creation, successes, and challenges. Gain insights into the differences between bug bounty programs and the black market, understanding how these initiatives can combat the effects of illicit activities. Discover the unique aspects of Mozilla's program, which covers both client-side and website security for Firefox and the Mozilla Foundation. Examine the various types of bug bounty programs, their values, benefits, and potential concerns. Learn about the process of managing submissions, including the role of the Bugmatic Committee and Web Body Process. Analyze the results and cost breakdown of successful programs, and explore who typically submits bugs. By the end of this talk, acquire the knowledge needed to determine if a bug bounty program would benefit your organization and how to initiate one effectively. Read more

Bug Bounty Programs - Crowd Sourcing Security

nullcon
Add to list
00:00
-00:56