identity management internet security security encryption authentication live cctv man-in-the-middle attack identity authentication privacy microsoft .net authentication access control identity 2.0 land attack alarm business logic bombs