security vulnerabilities traq cctv crypto hacking authentication cryptography exploits alarm access control vulnerability alerts internet security