Table of Contents

 1     Scope            
 2     References   
 3     Definitions   
        3.1     Terms defined elsewhere
        3.2     Terms defined in this Supplement
 4     Abbreviations and acronyms  
 5     Conventions
 6     Overview      
 7     Architecture of security systems for the prevention of fraudulent activities in public carrier networks    
 8     Technical methods to provide guidelines for security features on internal (end-to-end) service provisioning, assurance and billing processes    
 9     Technical methods to address security controls for preventing external fraud attacks affecting public carriers' customers and partners    
10     Fraud loss estimation               
11     Guidelines for information exchange related to fraudulent activities            
Bibliography