Question

Assume you neglected to manage permissions and access control to GitHub, and a hacker has obtained...

Assume you neglected to manage permissions and access control to GitHub, and a hacker has obtained access to your code repository. What Git feature can you use to discern which code commits were authorized by you and your team, and which ones were uploaded by the hacker?

Group of answer choices

If you know what time the hacker obtained access to your repository, you can assume that all commits made after that time must have been made by the hacker.

If you signed and tagged your commits with a PGP key, you can check which commits were signed by a trusted key, indicating that they were made by an authorized user.

GitHub will show you what IP address made a commit. You can check what your current IP address is against the IP address the commits were made from, and assume that any mismatches were commits that you did not authorize.

GitHub tells you which user made a commit. If the commit says it was made by your username, it must have been made by you.

Homework Answers

Answer #1

Ans: b)If you signed and tagged your commits with a PGP key, you can check which commits were signed by a trusted key, indicating that they were made by an authorized user.

Explanation :

We can use PGP to sign commits with a PGP key that we generate ourselves.

GitHub uses OpenPGP libraries to confirm that our locally signed commits and tags are cryptographically verifiable against a public key we have added to our GitHub account.

If we see other options, it is easy to see that these methods can be faked or could be bypassed. For eg : If we can track IP address, the hacker might use some VPN or maybe the time the hacker has the access to repository, someone else from the team make a commit(legit person). So it is hard to tell in these cases.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
You must implement a dynamic webpage the provides a basic task-list functionality. In particular, you page...
You must implement a dynamic webpage the provides a basic task-list functionality. In particular, you page should provide a user an interface to add and remove a task as well as mark a task as completed. For this version of the assignment, the tasks will be added directly in the HTML page by manipulating the DOM. Moreover, you should maintain an array that stores task details. Each task comprise of three fields: task-title: which is a one-line description of the...
**[70 pts]** You will be writing a (rather primitive) online store simulator. It will have these...
**[70 pts]** You will be writing a (rather primitive) online store simulator. It will have these classes: Product, Customer, and Store. All data members of each class should be marked as **private** (a leading underscore in the name). Since they're private, if you need to access them from outside the class, you should do so via get or set methods. Any get or set methods should be named per the usual convention ("get_" or "set_" followed by the name of...
Penco is excited by the results of your previous work and has asked you to review...
Penco is excited by the results of your previous work and has asked you to review operations at Exciteco where it is an institutional investor. Exciteco manufactures electronic components for export worldwide, from factories in Finland, for use in smartphones and hand-held gaming devices. These two markets are supplied with similar components by two divisions, Phones Division (P) and Gaming Division (G). Each division has its own selling, purchasing, IT and research and development functions, but separate IT systems. Some...
You will write a program that loops until the user selects 0 to exit. In the...
You will write a program that loops until the user selects 0 to exit. In the loop the user interactively selects a menu choice to compress or decompress a file. There are three menu options: Option 0: allows the user to exit the program. Option 1: allows the user to compress the specified input file and store the result in an output file. Option 2: allows the user to decompress the specified input file and store the result in an...
You are an Audit Senior currently planning the 30 June 20X8 audit of Forest Limited, an...
You are an Audit Senior currently planning the 30 June 20X8 audit of Forest Limited, an Australian-owned company that produces and exports woodchips to Japan. Forest’s operations are located in Eden, on the far south coast of NSW. Timber is purchased from forests nearby, processed into woodchips and immediately stockpiled for export at the company’s shipyards at Twofold Bay. Forest contracts timber cutters to deliver set tonnages of logs to its mill throughout the year. Woodchips are transported to Japan...
You are an Audit Senior currently planning the 30 June 20X8 audit of Forest Limited, an...
You are an Audit Senior currently planning the 30 June 20X8 audit of Forest Limited, an Australian-owned company that produces and exports woodchips to Japan. Forest’s operations are located in Eden, on the far south coast of NSW. Timber is purchased from forests nearby, processed into woodchips and immediately stockpiled for export at the company’s shipyards at Twofold Bay. Forest contracts timber cutters to deliver set tonnages of logs to its mill throughout the year. Woodchips are transported to Japan...
Please read the article and answear about questions. Determining the Value of the Business After you...
Please read the article and answear about questions. Determining the Value of the Business After you have completed a thorough and exacting investigation, you need to analyze all the infor- mation you have gathered. This is the time to consult with your business, financial, and legal advis- ers to arrive at an estimate of the value of the business. Outside advisers are impartial and are more likely to see the bad things about the business than are you. You should...
Background You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting...
Background You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm with offices throughout the major regional centres of NSW and Queensland. Although a medium sized firm by national standards, MYH is the second largest regional accounting firm in Australia. Most of MYH’s audit clients are in the agriculture, mining, manufacturing and property industries. All of those industries are currently under pressure, either from a downturn in commodity prices or fierce competition from overseas...
You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm...
You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm with offices throughout the major regional centres of NSW and Queensland. Although a medium sized firm by national standards, MYH is the second largest regional accounting firm in Australia. Most of MYH’s audit clients are in the agriculture, mining, manufacturing and property industries. All of those industries are currently under pressure, either from a downturn in commodity prices or fierce competition from overseas competitors....
After reading the following article, how would you summarize it? What conclusions can be made about...
After reading the following article, how would you summarize it? What conclusions can be made about Amazon? Case 12: Amazon.com Inc.: Retailing Giant to High-Tech Player? (Internet Companies) Overview Founded by Jeff Bezos, online giant Amazon.com, Inc. (Amazon), was incorporated in the state of Washington in July 1994, and sold its first book in July 1995. In May 1997, Amazon (AMZN) completed its initial public offering and its common stock was listed on the NASDAQ Global Select Market. Amazon quickly...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT