4 Security Use Cases
Each security use case covers different security assets and concerns. Each product may implement a variety of different use cases. This section will discuss how to use the dsPIC33A hardware to realize several security use cases. The dsPIC33A hardware can implement other use cases and configurations beyond the ones listed in this document. The document covers the most common use cases, but the hardware can be used to realize other security use cases.
