Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Supplement      
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Background              
 7     Security threats for operation          
 8     Security requirements         
 9     Security countermeasures 
        9.1     Detection and recognition      
        9.2     Protection     
        9.3     Security audit and recovery   
Appendix I – A practice of MVNO security    
Bibliography