1     Scope        
 2     References             
 3     Definitions
        3.1     Terms defined elsewhere      
        3.2     Terms defined in this Recommendation          
 4     Abbreviations and acronyms           
 5     Classifications of threat      
        5.1     Definition of threat portability level   
        5.2     Definition of the intrusion area          
        5.3     Definition of availability levels           
        5.4     Examples of threat   
 6     Vulnerability of devices to be protected       
        6.1     Definition of vulnerability classifications         
        6.2     Example of vulnerability of equipment to be protected            
 7     Determination of EM mitigation levels        
        7.1     General        
Appendix I – HPEM threat and vulnerability    
        I.1               Calculating HPEM threat            
        I.2               Vulnerability of IT equipment     
Appendix II – Examples of EM mitigation Levels    
       II.1     Example of EM mitigation levels for an IP network service       
Appendix III – IEC Standards related to HPEM    
      III.1     Overview of the IEC HPEM Series