Abstract

People speak greatly about the electronic gadgets in the past, present and in future. Nobody spells that it is secure or insecure in terms of safety. More inventions are carrying into the society but in behind there are lot of pitfalls which could damage personal or organizations from upper level to ground level. It is very important to build secure systems to have safe usage of electronic gadgets. USA government is spending millions of dollars on secure data because in future their total dependency is on data. Technology is growing and the hackers (persons) who damage or steal our information and bank balances are similarly increase in parallel. Bug bounty hunting is the new technique that is enforced for finding the software security in the newly build software or year’s long existing software. New bug bounty methodology teaches us how to identify our software is secure or not and what the flaws or bugs in the software. NB2M mechanism gives the sources of cyber-attacks and study preserved producers for cyber-crimes. This process may be benefitted for organization as well as software professional who can gain lump sum dollars. It is better go for one to two years for bug bounty.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.