Security for PIL Simulations
Ensure that access to your development computer and the target hardware is secure.
Provide a secure communication channel between your development computer and the target application by applying the security measures listed in this table.
Communication Protocol | Security Measure |
---|---|
TCP/IP | Run your development computer and target application within a trusted private network or virtual private network (VPN). |
Serial | Use a point-to-point link between your development computer and target application, for example, a serial cable. |