1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations
and acronyms
5 Conventions
6 Introduction
6.1 Background
6.2 Threats analysis
6.3 Countermeasures
6.4 Security reference architecture
7 Threats analysis
7.1 Threats to data
7.2 Threats to applications
7.3 Threats to network
7.4 Threats to infrastructure
8 Countermeasures
8.1 Countermeasures for data
security
8.2 Countermeasures for application
security
8.3 Countermeasures for network
security
8.4 Countermeasures for
infrastructure security
8.5 Security management
9 Security
reference architecture for VoLTE network
Bibliography