authentication cctv internet security access control 2-factor usb tokens business security identity management 3-factor authentication alarm strong authentication 2 factor encryption privacy