Watch this video on YouTube
What type of threat is mitigated through the implementation of token-based authentication?