A computer hijack occurs when an attacker takes control of a computer system and exploits it. There are a number of ways computer hijacks can occur; most involve a network connection or physical access to the system and vulnerability in some part of the system. Once the hacker takes control of a system, he has the capability to use it however he wants. Many attackers use hijacked computers to steal private data, to monitor user activity, and/or to launch further hijack attacks against other systems, according to the IT services team from University of California Santa Cruz. Other hijack attempts are widespread, not targeting any specific person or organization. Common tools for this type of hijack are spam e-mail, phishing and viruses embedded in e-mails or websites. The impact on an organization can be even worse. Theft of trade secrets, personnel information,and credit card numbers can cost millions of dollars in lost revenue. If a compromised computer is used to attack a different system, law enforcement could mistakenly believe that the owner of the system is to blame for the attack. Recognizing phishing attacks, never opening unsolicited e-mail attachments and deleting spam are also great ways to reduce the risk of a computer hijack. Risk analysis and re-education of employees are crucial response measures in the event of a corporate computer hijack, as the company can be held responsible for negligence for poorly trained employees. Owners of a system that is hijacked can be held responsible legally for illegal activity even if they do not know about it. It is very important to respond quickly to a computer hijack to avoid felony prosecution under 18 U.S.C. Section 1030, which governs computer crimes. Writer Bio
