This is a type of security breach where a person positions themselves between the user and the entity the user is trying to communicate with on the network. The person then has the ability to intercept and read traffic or send false information to the destination. To guard against this type of attack, use an Ethernet crossover cable to directly connect the SBH to your computer when transferring keys to the device. This configuration creates a network of two and makes a man-in-the-middle attack improbable.