QUALITY ANDINNOVATION IN THE COMMUNICATIOS INDUSTRY
In ITU-T X.805 defines the framework for the architecture and dimensions to ensure end to end security of distributed applications. While the general principles and definitions apply treated there for all applications, the details of, for example, threats and vulnerabilities and countermeasures or provide depend on each application.
The security architecture is defined taking into account two main concepts, namely the layers and levels. The layers of security have to do with the requirements for network elements and systems that constitute the network end to end. The layer system provides a hierarchical view of security end to end network security based on layer by layer. There are three security layers: the infrastructure layer, service layer and application layer. One of the advantages of a layered model is that it guarantees the security end to end even when using different applications. Each layer has its own vulnerabilities and, therefore, be defined countermeasures in each of them. The infrastructure layer comprises network transmission devices, and the elements that compose it. The service layer has to do with the security of network service providers to provide to their customers, ranging from basic transport and connectivity, such as leased lines, to the value-added services such as instant messaging. The application layer is concerned with the security of network applications that are accessed by users, ranging from basic e-mail as to sophisticated video and collaboration, in which video transfers are used much more elaborate, such as for oil exploration, automotive design, etc.. (See Figure 1)
Investment in Telecommunications in the security field.
To build a telecommunications network border security, the Federal Government through the Ministry of Communications and Transportation (SCT) and the Federal Public Security Secretariat (SSP) signed an agreement with officials from the U.S. Government to discuss various communications systems.
This agreement aims to improve communications interoperability between the two governments, especially among government forces through new cross-border channels for voice and data. In addition, special measures will be implemented to avoid interference from broadcasting. These actions will better position to combat violence and crime on both sides of the border.