1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Threat evaluation
5.1 Definitions of threat portability levels
5.2 Definition of the intrusion area
5.3 Definition of threat availability levels
5.4 Examples of threat devices
6 Vulnerability of devices to be protected
6.1 Definition of vulnerability classifications
6.2 Examples of vulnerability of various equipment types to be
protected
7 Determination of EM mitigation levels
7.1 General
Appendix I – HPEM threat and vulnerability
I.1 Calculating HPEM threat
I.2 Vulnerability of IT equipment
Appendix II – Examples of EM mitigation levels
II.1 Example of EM mitigation levels for an IP network service
Appendix III – IEC Standards related to HPEM
III.1 Overview of the IEC HPEM Series
Bibliography