Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Introduction             
        6.1     Background  
        6.2     Threats analysis           
        6.3     Countermeasures      
        6.4     Security reference architecture            
 7     Threats analysis      
        7.1     Threats to data            
        7.2     Threats to applications             
        7.3     Threats to network    
        7.4     Threats to infrastructure         
 8     Countermeasures 
        8.1     Countermeasures for data security     
        8.2     Countermeasures for application security        
        8.3     Countermeasures for network security             
        8.4     Countermeasures for infrastructure security  
        8.5     Security management              
 9     Security reference architecture for VoLTE network 
Bibliography