First page Back Continue Last page Overview Graphics
- Looking over the shoulder for passwords or other information.
- Can find out a lot from an unattended terminal.
- Attacker can get close enough in a variety of roles (flower delivery man, phone tech, etc.).
- Sometimes even looking at what side of the keyboard or if hands moved up to numbers.