1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Threats to distributed ledger systems
6.1 Threats to protocols
6.2 Threats to networks
6.3 Threats to data
7 How stakeholders can use this Recommendation
Annex A – Security features of DLT
Appendix I – DLT threat assessment
Appendix II – Impact of quantum computing on common cryptographic
algorithms
Appendix III – Risk | DLT system | Protection security expression model
III.1 Abbreviations and acronyms
III.2 Risk | DLT system | Protection security expression model
Bibliography