Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Mitigation methods against electromagnetic security threats             
        6.1     High-altitude electromagnetic pulse    
        6.2     High-power electromagnetic  
        6.3     Information leakage   
        6.4     Lightning          
Bibliography