Home Editor’s Pick Understanding Identity System Protections in Modern IT and IoT Environments