1
Scope
2 References
3 Definitions
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Objectives
8 Deceptive software and spyware
9 Why deceptive software and
spyware matter
10 Recommendations
11 Guidance for telecommunication
service providers (TSPs)
11.1 Manage information
security risk in the business
11.2 Safety and security
requirements for web hosting services
11.3 Safety and security
guidance for end-users
Appendix I – Additional resources
I.1 Online security and
anti-spyware references
I.2 Sample list of
incident escalation contacts
Bibliography