authentication network security identity authentication antivirus internet security identity verification cryptography man-in-the-middle attack logic bombs firewall microsoft .net authentication encryption live criminal background check identity 2.0 security land attack