Describe how a man-in-the-middle attack may be carried out on apublic network.