Problwm
1. What is the difference between a backdoor, a bot, a key logger, spyware, and a rootkit? Can they all be present in the same malware?
2. What is the difference between a "phishing" attack and a "spear-phishing" attack, particularly in terms of who the target may be?