Achia Admoni
Unknown Affiliation

Published : 1 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search

"A Horse with No Name"*: The Role of Trojan Horse in Cyber Warfare During its' First Decade (1972-1983) Achia Admoni
HISTORICAL: Journal of History and Social Sciences Vol. 4 No. 3 (2025): History and Cultural Innovation
Publisher : Perkumpulan Dosen Fakultas Agama Islam Indramayu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58355/historical.v4i3.197

Abstract

For over four decades, the Trojan horse has been a persistent threat in the digital landscape. Since its inception, this malicious software has evolved alongside technological advancements, adapting to new platforms and exploiting emerging vulnerabilities. This paper examines the early years of the Trojan horse, from 1972 to 1983, focusing on three key aspects: the victim, the source, and the technological environment. Victim Perspective: In the early days of the Trojan horse, the primary concern was data integrity. Malware was designed to corrupt, delete, or steal sensitive information. However, as technology progressed, the focus shifted towards system disruption. Modern malware often aims to disable or compromise entire systems, rather than simply accessing data. Source Perspective: During the early years, there was little discussion about the origins of malware or methods to prevent it at the source. However, as the threat landscape evolved, so too did the strategies for combating malware. Environmental Perspective: The technological environment has played a significant role in the evolution of malware. This perspective address significant events in the malware's history, events which by the way teach us much about the development of technology during this time. The period of 1972 to 1983 provides the first case of a Trojan horse in the wild. The objective of this paper is to illustrate that a meticulous examination of past malware incidents can provide valuable insights into contemporary and forthcoming cyber threats.