1 Scope of Recommendation
2 References
3 Definitions of terms
3.1 Terms defined in Recommendation
F.851 [1]
3.2 Terms not defined in
Recommendation F.851 [1]
4 Abbreviation and acronyms
5 Introduction
5.1 Fraud
5.2 Confidentiality
5.3 Service availability
5.4 Protection scheme
6 General description
6.1 General objectives for security
6.2 General security requirements
7 UPT security threats
7.1 Threats associated with UPT
features
7.2 Threats associated with
internetwork communications
7.3 Unintentional situations
8 System requirements on security
8.1 Service related requirements
8.2 Access related requirements
8.3 Network operational requirements
8.4 Security management requirements
9 Security features for UPT
9.1 UPT service features providing
security
9.2 Security features for user access
9.3 Security features for internetwork
communications
9.3.1 Secure dialogue
9.3.2 Secure file transfer
9.4 Security limitation
9.4.1 DTMF based user access
9.4.2 Out-band DSS1 based user access
10 Security mechanisms for UPT 10.1 Access control mechanisms
10.1.1 Access control to services
10.1.2 Access control to service profile data
10.1.3 Access control to the data in the UPT device
10.2 User authentication mechanisms
10.2.1 Degrees of authentication
10.2.2 Types of UPT device
10.2.3 User signalling
10.3 Security management mechanisms
10.3.1 Security audit trail
10.3.2 Event handling actions
10.3.3 Charging control
10.3.4 Information management