1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this supplement
4 Abbreviations and acronyms
5 Conventions
6 Guidelines for reducing malware in ICT networks
6.1 Mitigation in end-user platforms
6.2 Mitigation in applications
6.3 Mitigation in external and portable devices
Bibliography