This paper will examine the risks and discuss available security frameworks. Public key infrastructure and digital signatures will be examined. After that, the paper will focus on encryption and authentication technologies, concentrating mainly on TCP/IP-based security protocols, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS), IPSec, and Kerberos. Implications for product development will be explored, including available opensource implementations. Finally, this paper will cover security features and extensions of popular Internet protocols. By the end of this paper, readers will have gained a basic understanding of the security risks of Internet connectivity as well as the technologies that can mitigate those risks.