Methods For Identifying, Authenticating & Access Control For Resistance Against Cyber Attacks