Trojan Horse A deadly situation where the inside is collapsed by factors from outside is called a “Trojan.” It means to hide secretly so that the other person does not notice the inflow, which means “like a Trojan,” or “bravely, diligently, and hard work.” The soldiers inside the Trojan were really patriots who fought bravely and diligently for their lives. The word originated from this perspective. These days, however, the Trojan horse is sometimes called the epitome of computer malware, and it would be unfair for the soldiers inside the Trojan horse. The name is based on a malicious program that steals computer users’ information, and Greek soldiers inside the Trojan horse secretly hide from the other side so that the program does not notice the other person. It is a program that seems to cause no harm at all, but actually contains risk factors such as viruses. The word “Trojan” originates from the ancient Greek author Homer, B, C 800? – 750 A.D.). Here comes a Trojan horse that will play a crucial role in Greece’s defeat of Troy. The Greek army besieged the Trojan Castle for ten years and waged a war. However, the castle was not easily taken. The Greek army established a plan to give up the castle and deceive it as if it were exhausting and retreated, and some hid behind adjacent islands to create a huge horse. Then, about 30 elite soldiers were hidden in the horse, and the Greek army conducted a camouflage tactic to withdraw while leaving the huge horse intact. The Greek army thought the huge horse was simply retreating after being exhausted by the long war. The Trojans thought the huge horse as a trophy and introduced it into the castle in a festive mood as if they had gained a great treasure. After the feast was relaxed and the elite soldiers, including the Greek army Odysseus, who were hiding inside the horse in the middle of the night while they were sleeping drunk and distressed, escaped and opened the gate to allow the Greek troops waiting outside to enter the castle. The Greek army immediately captured the Trojan Castle as a rising tide. The victorious Trojans sat still helplessly and were defeated. In the end, this long war ends with Greece’s complete victory through horse tricks. Today’s Trojan horses, however, have become synonymous with computer malware. Some malicious codes pretend to be useful programs and induce users to install them without resistance, which are called ‘trojan horses’ for this reason. Something that can cause fatal damage, like the Greek Trojan horse, is hidden in it. This ‘trojan horse’, which accounts for a large proportion of malicious code, poses a great threat to the security of users in a variety of ways. These Trojan horses are usually found in software downloaded through email or the Internet, but the problem is solved simply by finding and deleting the applicable program. The difference from computer viruses is whether or not they have the ability to copy themselves. So since the virus becomes infected and the Trojan horse does not have the ability to copy, it can be solved by deleting only that program.