Step 6 - Retaining Access
Certain attacks rely on the hacker maintaining control and remaining undetected or in other words keeping your administrator rights. Moving round the network allows the hacker to remain undetected.
Planting malicious software enables the hacker to remain active for an undetermined period. Access can be regained at predetermined times suiting the hacker's preferences.
Protection: Check network traffic by analysing network device logs and live traffic.