

In a similar vein, a Trojan virus looks like legitimate software.

The Trojan horse appeared to be a legitimate gift.A Trojan virus, similarly, can be a good way to get behind an otherwise tight set of defenses. The Trojan horse gave them the access they had been wanting for a decade. In the original story, the attackers had laid siege to the city for 10 years and hadn’t succeeded in defeating it. The Trojan horse was a unique solution to the target’s defenses.There are a few elements of the story that make the term “Trojan horse” an appropriate name for these types of cyber attacks: The soldiers hid inside the huge wooden horse and once inside, they climbed out and let the other soldiers in. In the story, the enemies of the city of Troy were able to get inside the city gates using a horse they pretended was a gift.

The original story of the Trojan horse can be found in the Aeneid by Virgil and the Odyssey by Homer.
