1     Scope 
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Applying the X.805 concepts to the networks and end-user equipment     
        6.1     Three security layers in a network and in the end-user equipment    
        6.2     Classification of security controls in telecommunication        
        6.3     Roles of network and users
        6.4     Applicability of the security architecture components to network and users  
 7     Capabilities for further division of the security controls      
 8     Relationship to other ITU-T Recommendations concerning security           
Annex A – Possible composition of technical facilities of network and users