Which method will be used to secure a network against man-in-the-middle attack?