1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Mitigation methods against electromagnetic security threats
6.1 High-altitude electromagnetic pulse
6.2 High-power electromagnetic
6.3 Information leakage
6.4 Lightning
Bibliography