For example, where a user is duped into executing an email attachment disguised to appear innocuous (e.g., a routine form to be filled in), or by clicking on a fake advertisement on social media or anywhere else. Trojans are generally spread by some form of social engineering. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. In computing, a Trojan horse is any malware that misleads users of its true intent by disguising itself as a standard program. Security information and event management (SIEM).Host-based intrusion detection system (HIDS).