Table of Contents

 1     Scope            
 2     References   
 3     Definitions   
        3.1     Terms defined elsewhere
        3.2     Terms defined in this Supplement
 4     Abbreviations and acronyms  
 5     Conventions
 6     Overview      
 7     Architecture of security systems for the prevention of fraudulent activities in public carrier networks    
 8     Technical methods to provide guidelines for security features on internal (end-to-end) service provisioning, assurance and billing processes    
 9     Technical methods to address security controls for preventing external fraud attacks affecting public carriers' customers and partners    
10     Fraud loss estimation               
11     Guidelines for information exchange related to fraudulent activities