Table of Contents

 1     Scope        
 2     References             
 3     Definitions
        3.1     Terms defined elsewhere      
        3.2     Terms defined in this supplement      
 4     Abbreviations and acronyms           
 5     Conventions           
 6     Guidelines for reducing malware in ICT networks    
        6.1     Mitigation in end-user platforms        
        6.2     Mitigation in applications      
        6.3     Mitigation in external and portable devices    
Bibliography