Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Threat evaluation   
        5.1     Definitions of threat portability levels 
        5.2     Definition of the intrusion area              
        5.3     Definition of threat availability levels  
        5.4     Examples of threat devices     
 6     Vulnerability of devices to be protected      
        6.1     Definition of vulnerability classifications            
        6.2     Examples of vulnerability of various equipment types to be protected
 7     Determination of EM mitigation levels          
        7.1     General            
Bibliography