System threats are defined as the misuse of system services and network connections to cause harm to the user. System threats can be used to launch program threats across an entire network, which is known as a program attack. System threats create an environment in which operating system resources and user files are misappropriated. These system threats enter the system either intentionally or unintentionally in order to gain access to sensitive data. A few of the system threats that affect the system structure are listed below.
Viruses:
Viruses are malicious code or programs that replicate themselves by copying themselves to another program, system, or host file. It remains dormant until it is activated, either intentionally or unintentionally, spreading the infection without the knowledge or permission of a user or system administrator.
Worms:
Worms are self-replicating programs that do not need to be copied to a host program in order to spread. Its primary function is to spread the infection to other computers while remaining active on the infected system. Worms frequently spread through automatic and unnoticed parts of an operating system. When a worm enters a system, it immediately begins replicating itself, infecting unprotected computers and networks.
Ransomware:
The victim’s computer is locked, usually through encryption, preventing the victim from using the device or data stored on it. To regain access to the device or data, the victim must pay the hacker a ransom, which is usually in the form of a virtual currency like Bitcoin. Malicious email attachments, infected software apps, infected external storage devices, and compromised websites can all be used to spread ransomware.
Trojans:
Trojan horses, also known as Trojans, are programs that masquerade as normal, safe applications while allowing a hacker remote access to your computer. As a result, the infected computer can be used in a denial-of-service attack, and data theft can occur.