authentication ffiec live internet security encryption compliance banking microsoft .net authentication identity 2.0 identity authentication glba man-in-the-middle attack 2-factor authentication land attack 3-factor authentication 2-factor security logic bombs