Troydm87 Troydm87 16-11-2022 Computers and Technology contestada Describe how hackers maintain access in a system. What steps do they follow? What tools do they use? In your opinion, once in a system, is it easy to maintain access? Why or why not? What challenges are there to staying in the system?