cryptography access control crypto live bsi alarm firewall identity authentication man-in-the-middle attack land attack cctv authentication encryption microsoft .net authentication common criteria logic bombs it-grundschutz internet security security identity 2.0