Privilege Escalation

  What is Privilege Escalation and describe some ways attackers can escalate privileges in order to gain administrative access to a network system?