Answer:
Threat to
Step-by-step explanation:
Cyber attackers exploit system and network vulnerabilities to steal or temper with data in the network. They possess programming and networking skills to hack a network. They use malicious softwares or malwares to bypass security policies and to creat and exploit vulnerabilities in the network.
Virus, worm, rootkit, trojan horse, keylogger etc are examples of malware used by cyber attackers or hackers. They are threats to computer systems in a network as they weaken the security of the network.