Which of the following BEST describes a set of programs and code that allows an undetectable presence on a system with administrative rights?