1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Classifications of threat
5.1 Definition of threat portability level
5.2 Definition of the intrusion area
5.3 Definition of availability levels
5.4 Examples of threat
6 Vulnerability of devices to be protected
6.1 Definition of vulnerability classifications
6.2 Example of vulnerability of equipment to be protected
7 Determination of EM mitigation levels
7.1 General
Appendix I – HPEM threat and vulnerability
I.1 Calculating HPEM threat
I.2 Vulnerability of IT equipment
Appendix II – Examples of EM mitigation Levels
II.1 Example of EM mitigation levels for an IP network service
Appendix III – IEC Standards related to HPEM
III.1 Overview of the IEC HPEM Series
Bibliography