Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution