Internet connections expose applications to intrusions and malicious attacks. However, security techniques developed for enterprises and desktop computing do not entirely satisfy embedded application requirements. It is important for standard development practice to include rigorous security analysis so as not to overlook even simple and currently available solutions.