A man-in-the-middle attack is a type of security breach where an attacker positions themselves between the user and the entity the user is trying to communicate with on the network. The attacker can then intercept and read traffic or send false information to the destination. To guard against this type of attack, use an Ethernet cable to directly connect the CEG to your computer when you transfer keys to the CEG. This configuration creates a network of two devices and makes a man-in-the-middle attack improbable.