Persistence

Malware weapon installs access point (e.g., "backdoor"). Persistence mechanisms can be used to survive changes within the target environment.