security live access control man-in-the-middle attack authentication crypto identity 2.0 alarm microsoft .net authentication cryptography land attack internet security identity authentication cctv logic bombs