In today's interconnected world, telecommunication infrastructure security has become a critical concern for governments, businesses, and individuals alike. The reliance on telecommunications networks for communication, data transfer, and vital services is unparalleled, making the protection of these networks paramount.
However, as cyber threats continue to evolve and grow in sophistication, the task of securing telecommunication infrastructure becomes increasingly complex. This discussion aims to delve into the intricacies of telecommunication infrastructure security, exploring the importance of understanding the hardware, addressing vulnerabilities, securing physical access, mitigating insider threats, implementing access control systems, conducting regular security audits, and collaborating with security agencies.
By highlighting the key challenges and effective strategies, this discussion will provide valuable insights into safeguarding our telecommunication infrastructure, ensuring its resilience and protecting the critical services it underpins.
Key Takeaways
- Telecommunication infrastructure security is crucial for the functioning of businesses, public safety, government operations, and national security.
- Hardware components such as antennas, cables, and switching devices play a vital role in the smooth operation of communication networks.
- Perimeter security measures like fence sensors and video analytics are necessary to detect and prevent unauthorized access.
- Vulnerabilities in telecom hardware, including insider threats and inadequate security measures, can lead to disruptions in communication services and pose risks to critical infrastructure and sensitive data.
Importance of Telecommunication Infrastructure Security

The importance of telecommunication infrastructure security cannot be overstated, as it is essential for the functioning of businesses, public safety, government operations, and national security.
Telecom infrastructure serves as the backbone of communication networks, enabling the transmission of voice, data, and video signals between individuals, organizations, and governments. It encompasses a wide range of components, including physical infrastructure like cables, routers, and data centers, as well as software systems and protocols that facilitate communication.
Protecting telecom infrastructure is crucial to prevent disruption and ensure the overall functioning of the economy. Any attack on telecom infrastructure can lead to data breaches, service disruption, and potential manipulation of systems. This can have severe consequences, including financial losses, compromised privacy, and compromised national security. For businesses, telecom infrastructure security is of paramount importance as it enables them to operate efficiently, communicate with customers and partners, and protect sensitive information.
The increasing number of cyber attacks on the telecom sector has raised the importance of strict regulations and investment in security solutions. With the expansion of 5G technology and the broader software ecosystem, securing telecom infrastructure has become more complex and vital. The interconnectedness of devices, networks, and applications in the telecom sector creates more opportunities for malicious actors to exploit vulnerabilities and launch sophisticated attacks.
To address these challenges, telecom operators and governments must collaborate to implement robust security measures. This includes deploying advanced intrusion detection and prevention systems, implementing encryption protocols, conducting regular security audits, and providing training to employees. Furthermore, governments need to establish strong regulatory frameworks that enforce security standards and ensure accountability.
Understanding Telecom Infrastructure Hardware
Understanding telecom infrastructure hardware is crucial for ensuring the security and reliability of communication networks. Hardware components such as antennas, cables, and switching devices play a vital role in transmitting and managing telecommunications data.
To protect this infrastructure, perimeter security measures like fence sensors and video analytics are employed to detect and deter unauthorized access.
Hardware Components
Hardware components play a critical role in facilitating the exchange of voice, data, and video communication services within interconnected telecom networks. These components include transmission devices such as antennas, cables, and satellite dishes, which enable the transfer of signals over long distances.
Switching devices, such as telephone exchanges, mobile phone networks, and computer networks, are also integral to telecom infrastructure as they route and manage the flow of communication.
Hardware components are essential for ensuring national security, economic security, health, and safety.
To protect telecom infrastructure, perimeter security measures are deployed, including fences, sensors, lighting, signage, and intercoms, to detect, deter, delay, and respond to potential intruders.
The reliability and security of these hardware components are crucial for maintaining the smooth operation of telecom networks and safeguarding sensitive information.
Security Measures
As we shift our focus to the subtopic of securing telecom infrastructure, it is imperative to comprehensively evaluate the measures employed in order to ensure the protection of hardware components and maintain the integrity of communication networks.
The following security measures are crucial in safeguarding telecom infrastructure:
- Perimeter Security: Utilizing fence sensors, motion sensors, and video analytics helps detect any unwanted activity or breaches. The systematic deployment of fences, security lighting, signage, and intercoms helps deter intruders and enhance telecom infrastructure security.
- Maintaining Communication Perimeter Fences: Regular maintenance of communication perimeter fences is essential for delaying and stopping intruders, thus protecting telecom infrastructure.
- Intrusion Response: In the event of an intrusion, it is vital to respond promptly by assessing the situation, alerting security personnel, and informing law enforcement. This swift response helps mitigate potential damage and ensures the safety of the communication networks.
Implementing these security measures is essential to safeguard telecom infrastructure, which is critical for the functioning of the economy, national security, and public welfare.
Vulnerabilities in Telecom Hardware

Exploiting vulnerabilities in telecom hardware poses a significant risk to the security and integrity of critical infrastructure and sensitive data. Inadequate security measures in telecom hardware can lead to disruptions in communication services and compromise national security. Malicious actors target telecom hardware for physical and cyber attacks, posing a significant threat to the infrastructure's integrity.
One major concern is the increasing number of IoT devices connected to telecom hardware. These devices introduce additional vulnerabilities that require robust security measures to mitigate risks effectively. As these devices become more prevalent, it is crucial for telecom providers to ensure that their hardware infrastructure can withstand potential attacks.
Telecom providers must address several key areas to safeguard their hardware infrastructure. Insider threats are a significant concern, as employees with access to sensitive systems can exploit vulnerabilities in telecom hardware. Implementing strict access controls and conducting regular security training can help mitigate this risk.
Furthermore, the rise of remote work has expanded the attack surface for potential threats. Remote access to telecom hardware must be secured through secure remote access protocols, two-factor authentication, and regular security audits.
Third-party risks also pose a threat to telecom hardware security. Telecom providers should establish stringent security requirements for their vendors and conduct regular assessments to ensure compliance.
Protective Measures for Telecom Hardware
To ensure the security of telecom hardware, it is essential to implement a range of protective measures that effectively safeguard the infrastructure from potential threats. These measures include:
- Perimeter Security: Implementing perimeter security protection measures is crucial to prevent unauthorized access to telecom hardware. This can be achieved by installing fence sensors, motion sensors, and video analytics. These technologies can detect any unusual activity near the infrastructure and alert security personnel in real-time.
- Deterrents: Deploying deterrents can significantly reduce the chances of intrusions. Security lighting can illuminate the surroundings, making it difficult for intruders to approach undetected. Signage indicating the presence of security measures can act as a deterrent, while intercoms can provide a means for communication and verification before granting access.
- Maintenance of Perimeter Fences: Proper maintenance of communication perimeter fences is essential to delay and stop intruders. Regular inspections should be conducted to ensure there are no weak points or breaches in the fence. Additionally, any damages or vulnerabilities should be promptly repaired to maintain the integrity of the protective barrier.
Securing Physical Access to Telecom Infrastructure

Securing physical access to telecom infrastructure requires the implementation of robust protective measures to safeguard against unauthorized entry and potential threats. Telecom infrastructure plays a critical role in supporting businesses, public safety, government operations, and the overall economy, making its protection vital for national security and public welfare. To ensure the security of physical access to telecom infrastructure, several measures can be implemented.
One effective measure is the deployment of fence sensors, motion sensors, and video analytics to detect and deter unwanted activity around the telecom infrastructure. These sensors can detect any unauthorized movement near the infrastructure and trigger alarms to alert security personnel. Additionally, security lighting can be installed to deter potential intruders and enhance visibility during nighttime. Signage can also be utilized to warn against unauthorized access and inform individuals about the presence of security measures.
To further enhance security, intercoms can be installed at entry points to allow communication between security personnel and individuals seeking access. This enables prompt response to breaches and ensures that only authorized personnel are granted entry. Regular maintenance of communication perimeter fences is crucial to delay and stop intruders from accessing telecom infrastructure.
In the event of an intrusion, it is essential to have a system in place to assess and alert security personnel. This can be achieved through the integration of intrusion detection systems that can quickly identify and notify security personnel of any unauthorized access attempts. Swiftly informing law enforcement authorities is also crucial to address the situation effectively.
Implementing Surveillance Systems for Telecom Infrastructure
Implementing surveillance systems for telecom infrastructure involves leveraging advancements in surveillance technology to enhance monitoring capabilities. By utilizing advanced video analytics and motion sensors, telecom infrastructure can detect and deter unauthorized access and potential security threats.
Integrating surveillance systems with perimeter security measures creates a layered security approach, while remote monitoring capabilities allow for real-time observation and response to security incidents.
Surveillance Technology Advancements
Advancements in surveillance technology have become crucial for ensuring the security of telecommunication infrastructure. With the ever-increasing threats to network infrastructure, telecom operators are constantly seeking innovative surveillance solutions to safeguard their systems.
The following are some key surveillance technology advancements that are currently shaping the telecom industry:
- Artificial Intelligence (AI) Integration: AI-based surveillance systems have revolutionized the way telecom infrastructure is monitored. These systems can analyze vast amounts of data in real-time, detecting anomalies and potential security breaches more accurately and efficiently.
- Video Analytics: Video analytics technology has significantly enhanced the capabilities of surveillance systems. It enables automatic monitoring of video feeds, detecting suspicious activities, and generating alerts. This technology helps telecom operators in identifying potential threats and taking prompt action.
- Internet of Things (IoT) Integration: By integrating surveillance systems with IoT devices, telecom operators can remotely monitor critical infrastructure components such as towers, data centers, and transmission lines. This ensures proactive surveillance and timely response to any security incidents.
Benefits of Monitoring
Continuous monitoring of telecommunication infrastructure through the implementation of surveillance systems offers numerous benefits for telecommunication infrastructure security.
Firstly, it enhances security by providing real-time insights into potential threats and enabling quick responses to mitigate risks. Surveillance systems also aid in early threat detection, allowing for proactive intervention to prevent unauthorized access and physical intrusions.
Furthermore, monitoring telecom infrastructure enhances operational efficiency by providing real-time information on equipment performance, network status, and environmental conditions, enabling prompt maintenance and optimization. Compliance assurance is another advantage, as surveillance systems help ensure adherence to security regulations and standards by monitoring and recording activities within the infrastructure.
Lastly, these systems facilitate incident investigation by providing video evidence and data, enabling the identification of the cause of security breaches or disruptions. Overall, implementing surveillance systems for monitoring telecommunication infrastructure enhances security, operational efficiency, compliance, and incident investigation capabilities.
Securing Power Supply for Telecom Infrastructure

Securing the power supply for telecom infrastructure is a critical aspect of ensuring uninterrupted communication services. The availability of a reliable and continuous power source is essential for the functioning of critical national infrastructure such as telecommunication networks.
Here are three key measures that can be implemented to secure the power supply for telecom infrastructure:
- Backup Power Systems: Telecom infrastructure must have backup power systems in place to provide electricity during power outages or emergencies. This is typically achieved through the use of uninterruptible power supply (UPS) units and backup generators. UPS units can provide short-term power backup, allowing for a smooth transition to backup generators if needed. Backup generators, typically fueled by diesel or natural gas, can provide long-term power backup and support the telecom infrastructure until the primary power source is restored.
- Redundant Power Distribution: Redundancy in power distribution helps ensure continuous power supply. This can be achieved by having multiple power sources and diverse power feeds. By having multiple power sources, such as connections to different electrical grids or alternative energy sources like solar or wind, the telecom infrastructure can switch to an alternate power source in the event of a failure in the primary power supply. Diverse power feeds, such as separate power cables or substations, can further enhance the resilience of the power supply.
- Monitoring and Maintenance: Regular monitoring and maintenance of power supply equipment are crucial for identifying and addressing potential issues before they result in power failures. This includes monitoring the performance of backup power systems, conducting routine inspections, and implementing preventive maintenance measures. It is also important to have a robust monitoring system in place to detect any power supply anomalies or failures and allow for immediate action.
Securing Communication Networks in Telecom Infrastructure
To ensure the secure operation of telecommunication infrastructure, robust measures must be implemented to protect and safeguard communication networks against potential threats and cyber attacks. The telecom sector faces increasing cyber attacks, with sensitive user information making it a prime target for malicious actors. With the evolving technology landscape, including 5G and IoT, the attack surface has expanded, demanding scalable security measures for telecom infrastructure.
Implementing a risk management framework is crucial for securing communication networks in the telecom infrastructure. This framework involves identifying potential threats, assessing their impact, and implementing appropriate controls to mitigate risks. Perimeter security protection is also vital and includes the deployment of fences, sensors, lighting, signage, and intercoms to deter and detect intruders.
To provide a visual representation of the security measures, the following table showcases the different components and their functions:
Component | Function |
---|---|
Fences | Prevent unauthorized physical access to the infrastructure |
Sensors | Detect and notify security personnel of any suspicious activity |
Lighting | Ensure visibility and deter potential intruders |
Signage | Clearly display security protocols and warnings |
Intercoms | Enable communication between security personnel and authorized individuals |
Importance of Data Encryption in Telecom Infrastructure

Data encryption plays a crucial role in securing telecommunication infrastructure by providing a method of protecting sensitive data. With the increasing number of cyber threats and attacks, ensuring data safety has become a top priority for telecom companies.
Encryption not only safeguards data from unauthorized access but also enhances the overall security of the telecom infrastructure, making it more resilient to potential breaches.
Encryption: Data Protection Method
The implementation of robust encryption measures in telecom infrastructure is crucial for ensuring the integrity and confidentiality of sensitive information, such as customer data and operational details. Encryption, as a data protection method, provides several important benefits in the telecom industry:
- Preventing unauthorized access: Encryption helps prevent unauthorized access and manipulation of data, ensuring that only authorized individuals can view and modify the information.
- Mitigating damage in the event of a breach: In the unfortunate event of a security breach or cyber-attack, encrypted data is significantly harder for attackers to exploit. This can help mitigate potential damage and protect sensitive information from falling into the wrong hands.
- Compliance with data protection regulations: Compliance with data protection regulations and standards, such as GDPR, HIPAA, and PCI DSS, requires the implementation of robust encryption measures. By encrypting data, telecom infrastructure can meet these requirements and ensure the privacy and security of customer information.
Telecom Security: Ensuring Data Safety
With the increasing prevalence of cyber threats in the telecom sector, the importance of robust data encryption in ensuring the safety and security of sensitive information within telecom infrastructure cannot be overstated. Data encryption is a crucial method to protect customer data from unauthorized access. It plays a vital role in maintaining the integrity and trust of telecom networks. By implementing encryption technology, telecom companies can safeguard against cyber and physical attacks, preventing malicious exploitation of sensitive information. Effective data encryption in telecom infrastructure is not only essential for protecting customer privacy but also for national security, economic stability, and public safety. To emphasize the significance of data encryption in telecom security, the following table illustrates its benefits:
Benefits of Data Encryption in Telecom Security |
---|
Protects sensitive customer information |
Maintains the integrity of telecom networks |
Safeguards against cyber and physical attacks |
Ensures national security and economic stability |
Enhances public safety |
Encryption Benefits: Enhanced Infrastructure Security
To ensure enhanced infrastructure security, data encryption in telecom infrastructure is of utmost importance. Encryption benefits play a critical role in safeguarding sensitive information and preventing unauthorized access. Here are three key advantages of data encryption in telecom infrastructure:
- Confidentiality: Encryption ensures that data remains confidential by converting it into an unreadable format. This prevents unauthorized individuals from accessing and understanding the information, even if they manage to intercept it.
- Integrity: Encryption provides assurance that the data has not been tampered with during transmission or storage. By using cryptographic algorithms, any unauthorized modifications to the data can be detected, allowing for prompt action to maintain data integrity.
- Authentication: Encryption facilitates the authentication process by verifying the identity of the sender or receiver. This ensures that the data is exchanged between legitimate parties, preventing unauthorized entities from accessing sensitive information.
Best Practices for Network Monitoring in Telecom Infrastructure

Implementing network monitoring best practices is crucial for ensuring the security of telecom infrastructure and enabling proactive threat detection and response. To achieve this, telecom companies should utilize network monitoring tools that provide real-time visibility into network traffic, performance metrics, and security events. These tools allow organizations to continuously monitor their network and identify anomalies or potential security threats promptly.
In addition to network monitoring tools, telecom companies should also employ intrusion detection systems (IDS) and security information and event management (SIEM) solutions. IDS can detect unauthorized access attempts or malicious activities by monitoring network behavior and identifying patterns that deviate from the norm. SIEM solutions collect, analyze, and correlate security event data from various sources, enabling organizations to detect and respond to security incidents effectively.
Regular network security assessments and audits are essential to identify vulnerabilities in the telecom infrastructure. By conducting these assessments, organizations can ensure compliance with security standards and continuously improve their security posture. These assessments should cover areas such as network configuration, access controls, and security policies.
Establishing a centralized security operations center (SOC) is another best practice for network monitoring in telecom infrastructure. A SOC serves as a command center for monitoring and managing network security. It coordinates incident response, provides real-time threat intelligence, and ensures swift resolution of security incidents.
Dealing With Insider Threats in Telecom Infrastructure
Insider threats pose significant risks to the security and integrity of telecom infrastructure, necessitating proactive measures to mitigate these potential breaches. To effectively deal with insider threats in telecom infrastructure, the following steps should be taken:
- Educate employees: Telecommunication companies need to prioritize cybersecurity education and train their employees on secure remote work practices. By raising awareness about the risks and consequences of insider threats, employees can become proactive in identifying and reporting any suspicious activities or vulnerabilities.
- Third-party risk management: Telecom providers must consider the security of their supply chain and third-party vendors. Implementing thorough vetting processes and contractual agreements that address security requirements can help mitigate the risk of insider threats originating from external sources.
- Robust monitoring and detection: Proper monitoring of individual systems and networks is crucial for detecting and neutralizing insider threats effectively. This includes monitoring access logs, user activities, and network traffic for any anomalies or unauthorized access attempts. Implementing intrusion detection systems and security information and event management (SIEM) solutions can enhance the detection capabilities of telecom infrastructure.
By implementing these measures, telecom providers can significantly reduce the risk of insider threats and protect critical systems and public devices.
The Communications Sector, including public safety organizations and mobile phone service providers, must work together to ensure the security of critical infrastructure sectors. By collaborating with law enforcement agencies and having dedicated security personnel, early warning signs of insider threats can be identified and appropriate actions can be taken to prevent potential breaches.
Implementing Access Control Systems for Telecom Infrastructure

Access control systems play a crucial role in ensuring the security and integrity of telecom infrastructure by preventing unauthorized entry and protecting sensitive equipment and data. These systems employ various methods to control access to telecom facilities, such as biometric systems, card readers, and keypads.
Biometric systems, which include fingerprint or iris recognition, provide a high level of security as they rely on unique biological traits that are difficult to replicate. Card readers, on the other hand, require authorized personnel to present a valid access card to gain entry. Keypads use a combination of numbers or codes to grant access to authorized individuals.
In addition to controlling physical access, access control systems can be integrated with surveillance and alarm systems to provide enhanced security measures. Surveillance cameras can monitor entry points and record any suspicious activity, while alarm systems can alert security personnel in the event of a breach. This integration allows for prompt response and mitigation of potential threats.
Implementing access control systems for telecom infrastructure requires a comprehensive assessment of security needs and potential vulnerabilities. A thorough evaluation of the facility's layout, critical areas, and sensitive equipment is necessary to determine the appropriate access control measures. This assessment should consider factors such as the number of authorized personnel, the level of security required, and any regulatory compliance requirements.
Regular maintenance and updates are crucial to ensure the effectiveness of access control systems in telecom infrastructure. System administrators should regularly review access logs, perform audits, and update access credentials to mitigate any potential weaknesses or unauthorized access attempts. Additionally, periodic training and awareness programs should be conducted to educate employees about the proper use of access control systems and the importance of maintaining security protocols.
Importance of Regular Security Audits for Telecom Infrastructure
Regular security audits for telecom infrastructure are vital for maintaining the integrity and security of the network.
These audits enable organizations to assess vulnerabilities and ensure compliance with security standards and regulations.
Audit Frequency
Frequent security audits play a vital role in safeguarding the integrity and resilience of telecom infrastructure. To optimize audit frequency, telecom organizations should consider the following:
- Identifying vulnerabilities: Regular security audits enable the identification of potential weaknesses in the telecom infrastructure. By conducting audits frequently, organizations can stay proactive in addressing these vulnerabilities before they are exploited by cyber threats.
- Mitigating evolving threats: The frequency of security audits directly impacts the ability to detect and mitigate evolving cyber threats. By conducting audits at regular intervals, organizations can stay updated on the latest threat landscape and implement necessary measures to protect their infrastructure.
- Ensuring compliance: Regular security audits help telecom organizations maintain compliance with industry regulations and security standards. By scheduling audits frequently, organizations can ensure that they meet the necessary requirements and avoid penalties or reputational damage.
Vulnerability Assessment
Telecommunication infrastructure relies on regular vulnerability assessments to ensure the robustness and resilience of security measures. Vulnerability assessments play a crucial role in identifying and addressing security weaknesses in telecom infrastructure.
By conducting regular security audits, organizations can evaluate the effectiveness of their existing security measures and identify areas for improvement. These assessments provide insights into potential risks and help in prioritizing security investments and resources.
In the rapidly evolving landscape of cyber threats and attacks, continuous vulnerability management is essential for maintaining the resilience of telecom infrastructure. Additionally, regular security audits are necessary for ensuring compliance with regulatory requirements and industry standards in the telecom sector.
Collaborating With Security Agencies for Telecom Infrastructure Protection

To ensure the security of telecom infrastructure, effective collaboration with security agencies is crucial in developing and implementing a comprehensive risk management framework in the communications sector. This collaboration involves establishing security partnerships with both public and private sector partners to ensure a coordinated effort in protecting telecom infrastructure from various threats.
Here are three key aspects to consider when collaborating with security agencies for telecom infrastructure protection:
- Coordinated Risk Management Framework: Collaborating with security agencies allows for the development and implementation of a coordinated risk management framework in the communications sector. By leveraging resources such as the Communications Sector Risk Management Agency Fact Sheet and Communications Sector Charters, telecom providers can work together with security agencies to identify and address vulnerabilities, assess risks, and implement appropriate security measures.
- Perimeter Security Protection: Prioritizing perimeter security protection is crucial in deterring, detecting, delaying, and responding to intruders targeting telecom infrastructure. With the support of security agencies, telecom providers can enhance their ability to monitor and protect critical infrastructure assets, including data centers, network facilities, and transmission sites. This includes implementing robust physical security measures, such as access controls, video surveillance, and intrusion detection systems.
- Safeguarding Sensitive Data and Critical Services: Collaborating with security agencies helps recognize the importance of telecom infrastructure security in safeguarding sensitive data, ensuring the continuity of vital public services, and protecting the economy. By sharing threat intelligence and insights, telecom providers can stay informed about increasing cyber attacks on the sector and implement proactive measures to mitigate risks. This collaboration also ensures compliance with strict regulations governing telecom networks as critical national infrastructure.
Frequently Asked Questions
What Are the 3 Types of Infrastructure Security?
Risk assessment is a crucial aspect of infrastructure security. It involves identifying potential risks and vulnerabilities within a system or facility.
The three types of infrastructure security include:
- Physical infrastructure security, which safeguards physical assets such as buildings and transmission devices.
- Cybersecurity, which focuses on protecting against cyber threats like network attacks and data breaches.
- Personnel security, which ensures the integrity and reliability of individuals with access to critical infrastructure.
Implementing robust security measures in these areas is essential for maintaining the overall security and resilience of telecommunication infrastructure.
What Is the Infrastructure of Telecommunication?
The infrastructure of telecommunication refers to the physical and virtual components that enable the transmission of information over long distances. It encompasses a wide range of technologies, including cables, satellites, wireless networks, routers, switches, and data centers.
These components work together to facilitate the transfer of voice, data, and video signals across various communication networks. The infrastructure of telecommunication plays a crucial role in connecting individuals, businesses, and organizations, enabling them to communicate and access information seamlessly.
How Do You Secure a Network Infrastructure?
Securing a network infrastructure involves implementing various measures to protect against unauthorized access and potential threats.
One crucial step is the use of network firewalls, which act as a barrier between internal and external networks, filtering incoming and outgoing traffic.
Additionally, secure authentication methods and strong encryption protocols should be employed to safeguard data in transit and at rest.
Regular updates and patches must be applied to address vulnerabilities, and network activity should be monitored to detect and respond to security incidents in a timely manner.
Is Cybersecurity Part of Telecommunications?
Yes, cybersecurity is an integral part of telecommunications.
With the evolution of technology and the increasing reliance on telecommunications networks, safeguarding these networks from cyber threats has become paramount.
Cybersecurity measures are implemented to protect the sensitive data transmitted through these networks and ensure the uninterrupted provision of public services.
As cyber threats continue to evolve, the telecom industry must continually adapt and enhance its cybersecurity practices to mitigate risks and maintain the integrity of its infrastructure.