As the sophistication of the Internet has increased, issues of transaction security, user authentication, and authorization have taken on greater and greater importance. Companies are turning to a network security model in order to control access to internal networks comprised of many hosts, as well as the services they offer. Embedded devices are becoming increasingly important network components, and users need embedded networking protocols composed of comprehensive, industry-standard security solutions. This technical paper describes common security-related technologies and networking protocols and their place in lowering potential security risks.