Security in Telecommunications and Information Technology
    Executive Summary
    1 Scope of Manual
    2 Basic Security Architectures and Services
        2.1 The Open Systems Security Architecture (X.800)
        2.2 The Lower and Upper Layer Security Models (X.802 and X.803)
        2.3 The Security Frameworks (X.810-X.816)
        2.4 Security Architecture for Systems Providing End-to-End Communications (X.805)
    3 The Fundamentals of Protection: Threats, Vulnerabilities and Risks
    4 Security Requirements for Telecommunication Networks
        4.1 Rationale
        4.2 General Security Objectives for Telecommunications Networks
    5 Public Key and Privilege Management Infrastructures
        5.1 Secret Key and Public Key Cryptography
        5.2 Public Key Certificates
        5.3 Public Key Infrastructures
        5.4 Privilege Management Infrastructure
    6 Applications
        6.1 VoIP using H.323 Systems
        6.2 IPCablecom System
        6.3 Secure Fax Transmission
        6.4 Network Management Applications
        6.5 E-prescriptions
        6.6 Secure Mobile End-to-End Data Communications
    7 Availability Dimension and Infrastructure Layer
        7.1 Path topologies and end-to-end path availability calculations
        7.2 Enhance the availability of a transport network Overview
        7.3 Protection
        7.4 Restoration
        7.5 Outside plant
    8 Incident Organization and Security Incident Handling (Guidelines) for Telecommunications Organizations
        8.1 Definitions
        8.2 Rationale
    9 Conclusions
    Annex A Catalogue of ITU-T Recommendations related to security
    Annex B Security Terminology
        B.1 List of security-related terms and definitions
        B.2 Security-related Acronyms
    Annex C List of Study Groups and Security-related Questions