Main Content

Security for PIL Simulations

Ensure that access to your development computer and the target hardware is secure.

Provide a secure communication channel between your development computer and the target application by applying the security measures listed in this table.

Communication ProtocolSecurity Measure

TCP/IP

Run your development computer and target application within a trusted private network or virtual private network (VPN).

Serial

Use a point-to-point link between your development computer and target application, for example, a serial cable.