encryption firewall cryptography access control security live antivirus man-in-the-middle attack identity authentication alarm microsoft .net authentication internet security identity 2.0 land attack network security cctv logic bombs