1     Scope           
 2     References 
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Supplement       
 4     Abbreviations and acronyms              
 5     Conventions             
 6     Background               
 7     Security threats for operation           
 8     Security requirements          
 9     Security countermeasures  
        9.1     Detection and recognition       
        9.2     Protection      
        9.3     Security audit and recovery    
Appendix I – A practice of MVNO security     
Bibliography