The term _______ is used to refer to programs that attackers install after gaining unauthorized access to a system, ensuring that they can continue to have unrestricted access to the system, even if their initial access method is discovered and blocked.