Describe two examples of vulnerabilities of automobiles for which auto manufacturers have instituted controls. Tell whether you think these controls are effective, somewhat effective, or ineffective

What will be an ideal response?

(1)
Vulnerability:
Someone
drives
your
car
away
without
your
permission.
Control:
Ignition
switch
lock.
Effectiveness:
Somewhat
effective
because
it
deters
casual
theft,
but
the
knowledgeable
thief
can
"hot
wire"
the
engine,
bypassing
the
ignition
switch.
(2)
Vulnerability:
Someone
who
does
not
realize
your
car
has
stopped
crashes
into
the
back
of
your
car.
Control:
Brake
lights.
Effectiveness:
Reasonably
good.
Note
the
redundancy
of
the
system:
with
two
brake
lights,
even
if
one
fails,
the
second
one
warns
other
drivers.

Computer Science & Information Technology

You might also like to view...

The ________ function calculates the payment amount required to pay off a loan for a given amount, a given number and frequency of payments, and a given interest rate

A) FV B) PV C) Nper D) PMT

Computer Science & Information Technology

What does an I D attribute ensure?

What will be an ideal response?

Computer Science & Information Technology