1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Threat evaluation
5.1 Definitions of threat portability levels
5.2 Definition of the intrusion area
5.3 Definition of threat availability levels
5.4 Examples of threat devices
6 Vulnerability of devices to be protected
6.1 Definition of vulnerability classifications
6.2 Examples of vulnerability of various equipment types to be
protected
7 Determination of EM mitigation levels
7.1 General
Bibliography