1
Scope
2
References
3
Definitions
3.1
Terms defined elsewhere
3.2
Terms defined in this Supplement
4
Abbreviations and acronyms
5
Conventions
6
General aspects
6.1
Security background
6.2
Characteristics of smartphones
6.3
Smartphone assets
6.4
Security considerations
7
Threats to smartphones
7.1
Overview of threats
7.2
Vulnerabilities of smartphones
7.3
Attacks to smartphones
8
Security framework of smartphones
8.1
Security objectives
8.2
Security framework
8.3
Security considerations
9
Security solutions for smartphones
9.1
Overall aspects
9.2
System improvements
9.3
Security tools
9.4
Integration of security solutions
Bibliography