Watching over peoples' shoulders as they use information or
information systems. Examples include watching people as they enter their
passwords, watching air travelers as they use their computers and review
documents while in flight, and observing users in normal operations to
understand standard operating procedures.
Complexity: This is a trivial
attack to carry out.