Corporate Cybersecurity by Jackson John;

Corporate Cybersecurity by Jackson John;

Author:Jackson, John; [Jackson, John]
Language: eng
Format: epub
Publisher: John Wiley & Sons, Incorporated
Published: 2021-10-15T13:39:55+00:00


6.3.3.5 Metrics Display

The metrics display tab shows various statistics that could potentially attract security researchers to the bug bounty program (Figure 6.71). However, the metrics that are displayed are completely up to the program manager. There isn’t necessarily a “wrong” way to display metrics.

Figure 6.71 Metrics display option.

6.3.3.6 Email Notifications

The email notifications tab is self-explanatory. Program managers have the ability to choose from three options. The options given are “No content,” “Minimal content,” and “Full content” (Figure 6.72).

Figure 6.72 Setting email notifications.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.