CONTENTS

 

 1     Scope 
 2     References 
 3     Definitions  
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Overview   
 7     Objectives 
 8     Deceptive software and spyware  
 9     Why deceptive software and spyware matter        
10     Recommendations          
11     Guidance for telecommunication service providers (TSPs)           
       11.1     Manage information security risk in the business     
       11.2     Safety and security requirements for web hosting services  
       11.3     Safety and security guidance for end-users
Appendix I – Additional resources     
        I.1        Online security and anti-spyware references          
        I.2        Sample list of incident escalation contacts 
Bibliography