...
首页> 外文期刊>Inside the Air Force >DOD expands bug bounty program to all publicly accessible systems
【24h】

DOD expands bug bounty program to all publicly accessible systems

机译:国防部将Bug Bounty程序扩展到所有可公开访问的系统

获取原文
获取原文并翻译 | 示例
           

摘要

The Defense Department is expanding its "bug bounty" program to all its publicly accessible information systems, allowing authorized hackers to investigate and report cyber vulnerabilities in industrial control systems, Internet of Things devices, and other networks. The development marks a major expansion in the scope of DOD's vulnerability disclosure program. The original program started with a "Hack the Pentagon" program in 2016 that allowed security researchers to probe public-facing DOD networks without fear of reprisal. In a little less than five years, researchers have submitted more than 29,000 vulnerability reports, and more than 70% were determined to be valid, according to DOD. The updated policy allows research and reporting of disclosures in all "publicly accessible networks, frequency-based communication, Internet of Things, industrial control systems, and more," according to Brett Goldstein, director of the Defense Digital Service.
机译:国防部正在将其“Bug Bounty”计划扩展到其所有可公开可访问的信息系统,允许授权黑客调查和报告工业控制系统,物联网和其他网络的网络脆弱性。 该开发标志着国防部漏洞披露计划范围的重大扩张。 原始程序于2016年开始“黑客五角大楼”计划,允许安全研究人员探讨面向公开的国防部网络,而不担心报复。 据国防部称,在一点不到五年的时间内,研究人员提交了超过29,000个漏洞报告,超过70%有效。 根据Bress Digital Service主任的Brett Goldstein,更新的政策允许研究和报告所有“公开可访问的网络,基于频率的网络,事物,工业控制系统,工业控制系统,以及更多”的披露。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号