identity management security authentication identity verification privacy internet security logic bombs cctv criminal background check identity authentication microsoft .net authentication encryption man-in-the-middle attack access control land attack alarm identity 2.0 business live