NB2M – Mechanism for Magnifying Micro Level Bugs for Secure Software System

Authors

  • D Anil Kumar Berhampur University. Berhampur, Odisha, India Author
  • Susanta Kumar Das Berhampur University. Berhampur, Odisha, India Author
  • Murali Krishna Senapaty GIET University, Gunupur, Odisha, India Author

DOI:

https://doi.org/10.47392/irjash.2021.106

Keywords:

Malware, bug, bug bounty, cyber-crimes, cyber-attacks

Abstract

People speak greatly about the electronic gadgets in the past, present, and in the future. Nobody spells that it is secure or insecure in terms of safety. More inventions are carrying into the society but behind there are a lot of pitfalls which could damage personal or organizations from upper level to ground level. It is very important to build secure systems to have safe usage of electronic gadgets. The USA government is spending millions of dollars on secure data because in the future their total dependency is on data. Technology is growing and the hackers (persons) who damage or steal our information and bank balances are similarly increasing in parallel. Bug bounty hunting is the new technique that is enforced for finding the software security in the newly built software or year’s long existing software. New bug bounty methodology teaches us how to identify if our software is secure or not and what the flaws or bugs in the software are. NB2M mechanism gives the sources of cyber-attacks and study preserved producers for cybercrimes. This process may be benefitted for organization as well as software professionals who can gain a lump sum of dollars. It is better to go for one to two years for bug bounty.

Downloads

Published

2021-04-01