SELECT ?property ?value WHERE { BIND (?? AS ?s) ?s ?property ?value . FILTER (isLiteral(?value)) } LIMIT 1000

Attributes

Bug-Bounty-Programm
bug bounty programme
programma bug bounty
programme de chasse aux vulnérabilités
Programm, bei dem Unternehmen oder Organisationen ergänzend zu anderen Sicherheitsmassnahmen mit ethischen Hackern zusammenarbeiten, um allfällige Verwundbarkeiten in IT-Systemen und -Anwendungen zu identifizieren, zu dokumentieren und zu beheben.
Programme in which companies or organisations work with ethical hackers to identify, document and fix vulnerabilities in IT systems and applications in a way that complements other existing cyber security measures.
Appel à des spécialistes qui recherchent des vulnérabilités dans des applications ou des configurations de serveur en échange d’une gratification pour les découvertes et remontées.
2025-05-08T07:24:16.4315220Z
502913
https://www.termdat.bk.admin.ch/entry/502913
BACS, Bug-Bounty-Programm zur Erhöhung der Cyberresilienz in der Bundesverwaltung ([Internet, 2025-04-22](https://www.ncsc.admin.ch/ncsc/de/home/infos-fuer/infos-it-spezialisten/themen/bug-bounty-programme.html))
UFCS, Programmi «bug bounty» per potenziare la ciber-resilienza nell’Amministrazione federale ([Internet, 2025-04-22](https://www.ncsc.admin.ch/ncsc/it/home/infos-fuer/infos-it-spezialisten/themen/bug-bounty-programme.html))
NCSC, Bug bounty programme to increase cyber-resilience in the Federal Administration ([Internet, 2025-04-23](https://www.ncsc.admin.ch/ncsc/en/home/infos-fuer/infos-it-spezialisten/themen/bug-bounty-programme.html))
Le CyberDico, "Programme de chasse aux vulnérabilités" ([Internet, 2025-05-08](https://cyber.gouv.fr/le-cyberdico#P))
EXP: bug bounty programs allow companies to leverage the hacker community to improve their systems’ security posture over time continuously
Programma in cui aziende o organizzazioni, integrando altre misure di sicurezza, collaborano con hacker etici per identificare, documentare ed eliminare eventuali vulnerabilità nei sistemi e nelle applicazioni IT.
Hackerone, What Are Bug Bounties and How Do They Work? ([Internet, 2024-03-25](https://www.hackerone.com/blog/what-are-bug-bounties-and-how-do-they-work))
secondo UFCS, Programmi «bug bounty» per potenziare la ciber-resilienza nell’Amministrazione federale ([Internet, 2025-04-23](https://www.ncsc.admin.ch/ncsc/it/home/infos-fuer/infos-it-spezialisten/themen/bug-bounty-programme.html))
nach BACS, Bug-Bounty-Programm zur Erhöhung der Cyberresilienz in der Bundesverwaltung ([Internet, 2025-04-22](https://www.ncsc.admin.ch/ncsc/de/home/infos-fuer/infos-it-spezialisten/themen/bug-bounty-programme.html))
after NCSC, Bug bounty programme to increase cyber-resilience in the Federal Administration ([Internet, 2025-04-23](https://www.ncsc.admin.ch/ncsc/en/home/infos-fuer/infos-it-spezialisten/themen/bug-bounty-programme.html))
Le CyberDico, "Programme de chasse aux vulnérabilités" ([Internet, 2025-05-08](https://cyber.gouv.fr/le-cyberdico#P))
SELECT ?property ?object WHERE { BIND (?? AS ?s) ?s ?property ?object . FILTER (isIRI(?object)) FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000
SELECT ?property ?subject WHERE { BIND (?? AS ?o) ?subject ?property ?o . FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000

Incoming Relationships

property subject
seeAlso bug bounty
seeAlso grille de primes
seeAlso vulnerabilities in IT systems
SELECT ?instance ?description WHERE { BIND (?? AS ?class) ?instance (rdf:type|owl:type) ?class . OPTIONAL { ?instance schema:description ?description . } } LIMIT 5000
Instances of this Class: No results found.
SELECT ?superclass ?description WHERE { ?? rdfs:subClassOf ?superclass . OPTIONAL { ?superclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Superclasses of this Class: No results found.
SELECT ?subclass ?description WHERE { ?subclass rdfs:subClassOf ?? . OPTIONAL { ?subclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Subclasses of this Class: No results found.