authentication encrypted policy security decryption key management cctv cryptography crypto alarm access control encryption agent internet security