Abstract: The actual communications networks and data security systems are usually constrained, despite of the advanced technologies that are used for their design and implementation. Actually the concept of perfect security is only theoretical one; this inherent limitation is provided by the economical costs of security measures implementation and also by some technical constraints.

Keywords: communication network; ootimization; data security systems; technical constraints.