What a MITM attack is, the risks it poses, and what steps you can take to protect yourself from such…