There are two types of passphrase. An encryption for the seed or an extension for the seed. The former is recommended for Trezor as there is an unfixable vulnerability which allows for an extraction of the seed given physical access to the device. An encryption on top of it would make the attack practically useless.
Please, never mind this, I do not get your point here. The encrypted passphrase should be BIP38 right? Which is also even called password, correct me if wrong. But, the hierarchical deterministic wallet only follow the BIP39 passphrase standard which is generated through salting in which making seed phrase to generate another keys and addresses entirely, this are the passphrase which are extra words, and it is what is supported by Trezor. BIP38 is used for wallets like paper wallet, not hierarchical deterministic wallets.
My biggest concern is that someone may hack it while I'm connected to my PC while I'm in Trezor Suite desktop app.
You will need to operate your wallet in a safe environment, making your computer to be completely safe from malware.
Like,what if someone can hack it while I'm making transaction or if I catch spy malware or some virus or someone infiltrate my PC without my knowledge?
You need to know ways to protect your device, making it not have malware. You will need to learn this before making use of bitcoin at all. Learn how to use your device in a way you will stay away from alware, not that hard if you learn about it.
Also,now when I set up Trezor and wrote down seed words as well as PIN,do I have to worry about anything else or is that all I need to have excellent protection?
The most important is the seed phrase, you need the pin to access your wallet, but if you are import the seed phrase to another wallet, the pin is no more needed. But remember what I posted above, that if the passphrase is included, you will need it along during seed phrase importation.
In case you later decide to use passphrase. These will be helpful:
No. The communication through USB won't allow for any malware to be able to obtain your secrets. The exploit works solely on the premise that the attacker is able to crack open your device and take the chip out to glitch it.
You are right, but I have heard the possibility of change address in which recipient address will be change to attackers address during sending, but checking the address again to make sure it is the recipient address is recommended. Also, the best is to operate hardware wallet in a safe environment with a safe computer.