Step 6 - Retaining Access
Certain attacks rely on the hacker maintaining control and remaining undetected or in other words keeping your administrator rights. Moving round the network allows the hacker to remain undetected.
Planting malicious software enables the hacker to remain active for an undetermined period. Access can be regained at predetermined times suiting the hacker's preferences.
Protection: Check network traffic by analysing network device logs and live traffic.
Steve Mac Media Limited - 7592963
Trading Address: Marne House, 24 Mount Ephraim Road, Tunbridge Wells, Kent TN1 1ED
Registered Office: 90-92 King Street, Maidstone, Kent, ME14 1BH