Watch this video on YouTube
Which attack method involves analyzing communication patterns between entities to deduce information?