encryption cryptography security identity verification alarm firewall logic bombs antivirus criminal background check identity authentication microsoft .net authentication access control man-in-the-middle attack internet security land attack network security identity 2.0 cctv live