and associated web server with which one is communicating, which protects against MITM (man-in-the- middle attacks). • Use VPN VPN is created by establishing a virtual point – to - point connection through the use of connections, protocols, or virtual traffic dedicated tunneling encryption.