When an unauthorized user invades a network, stays for an extended period of time, and steals data without harming the network.
When an unauthorized user invades a network, stays for an extended period of time, and steals data without harming the network.