Describe how hackers maintain access in a system. What steps do they follow? What tools do they use? In your opinion, once in a system, is it easy to maintain access? Why or why not? What challenges are there to staying in the system?