CONTENTS

 1     Scope of Recommendation
 2     References
 3     Definitions of terms
        3.1     Terms defined in Recommendation F.851 [1]
        3.2     Terms not defined in Recommendation F.851 [1]
 4     Abbreviation and acronyms
 5     Introduction
        5.1     Fraud
        5.2     Confidentiality
        5.3     Service availability
        5.4     Protection scheme
 6     General description
        6.1     General objectives for security
        6.2     General security requirements
 7     UPT security threats
        7.1     Threats associated with UPT features
        7.2     Threats associated with internetwork communications
        7.3     Unintentional situations
 8     System requirements on security
        8.1     Service related requirements
        8.2     Access related requirements
        8.3     Network operational requirements
        8.4     Security management requirements
 9     Security features for UPT
        9.1     UPT service features providing security
        9.2     Security features for user access
        9.3     Security features for internetwork communications
                  9.3.1     Secure dialogue
                  9.3.2     Secure file transfer
        9.4     Security limitation
                  9.4.1    DTMF based user access
                  9.4.2     Out-band DSS1 based user access
10     Security mechanisms for UPT
       10.1     Access control mechanisms
                 10.1.1     Access control to services
                 10.1.2     Access control to service profile data
                 10.1.3     Access control to the data in the UPT device
       10.2     User authentication mechanisms
                 10.2.1     Degrees of authentication
                 10.2.2     Types of UPT device
                 10.2.3     User signalling
       10.3     Security management mechanisms
                 10.3.1     Security audit trail
                 10.3.2     Event handling actions
                 10.3.3     Charging control
                 10.3.4    Information management