While it is contemplated that the TAP 320 would be maintained physically secure (as well as employing data and network security features including authentication, data integrity, confidentiality, etc. as previously described), this is not a requirement in all cases, since other types of protection mechanisms can be used consistent with the intent of providing a substantially distributed TA archite