Which of the following best describes the type of attack where an unauthorized individual gains access to confidential information by visually observing and memorizing data, such as entering a PIN at an ATM or typing a password on a keyboard?
Spoofing
Phishing
Shoulder surfing
Eavesdropping