Get help from the best in academic writing.

Insert surname3 Professor’s name Student’s name Course title Date Computers and cyber

Insert surname3

Professor’s name

Student’s name

Course title


Computers and cyber security

When ones laptop gets stolen, they risk having their banking information accessed and therefore the money stays at risk of theft too. This can put one at an awkward situation since he or she will have their financial records out there which can lead to a complete take over and eventual control of their accounts by the thief. Personal information getting exposed is another risk that can come with the loss of a laptop through theft. Details like physical address, members of one’s family, and their contacts can be used to intimidate them or even cause harm either physically or emotionally. Another health risk accrued from losing a laptop is getting out of touch with ones credit information. Thieves can use the credit card information in the laptop to make huge purchases from the owner’s deposits or even incur a lot of debts on the same. Some of these purchases may be illegal hence posing a risk to being an accomplice to a crime (Tu, Zhiling, 2015).

Vijay’s computer is infected with a spyware. A spyware monitors the user’s activities on the computer as well as the environment and reports it to a third party. Spywares mostly are either installed or send as discreet attachments to files that one accesses without knowing. This an illegal act as described in the cybercrime act. It is punishable by law (Harper, Jim, 2016).

The choice of password for the Nav750 is not strong enough as it uses basic information that people can easily identify. For instance, if the car owner double as the spouse, parent or the boss, it is clear that the two shares a lot of common interests and also know quite a lot about each other. Therefore, the security is not guaranteed since the password is easy to determine. This can also be disclosed to a third party violator risking the exposure of the car location through sent coordinates hence violating the privacy (Hoh, Baik, 2012).

Work cited

Harper, Jim. “Federal Spyware Legislation: Some Lessons from Antiquity.” Cato Policy Report. Edición 89 (2016).

Hoh, Baik, et al. “Enhancing privacy and accuracy in probe vehicle-based traffic monitoring via virtual trip lines.” IEEE Transactions on Mobile Computing 11.5 (2012): 849-864.

Tu, Zhiling, et al. “Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination.” Information & Management 52.4 (2015): 506-517.