internet security anti-virus live antivirus man-in-the-middle attack cctv alarm authentication identity 2.0 identity authentication network security microsoft .net authentication security land attack access control encryption firewall logic bombs