Watch this video on YouTube
Which type of common threat involves leveraging access to an environment to snoop on other systems within it?