Encystment

Malicious code can be introduced into the operating system when installing programs, performing malicious actions on the system, as a result of using suspicious Internet resources or downloading computer programs from damaged storage media, after scanning and infecting the hard drive with Trojans, as well as due to failure to comply with safety precautions when opening and viewing email. When transferring infected files or other computer equipment, encystment may occur and the virus image may spread. In addition, it can be inserted by an attacker during a meeting on an electronic network. Many antivirus programs infect and report viruses on their own computers.