Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Threat evaluation   
        5.1     Definitions of threat portability levels 
        5.2     Definition of the intrusion area              
        5.3     Definition of threat availability levels  
        5.4     Examples of threat devices     
 6     Vulnerability of devices to be protected      
        6.1     Definition of vulnerability classifications            
        6.2     Examples of vulnerability of various equipment types to be protected
 7     Determination of EM mitigation levels          
        7.1     General            
Appendix I – HPEM threat and vulnerability    
        I.1     Calculating HPEM threat            
        I.2     Vulnerability of IT equipment  
Appendix II – Examples of EM mitigation levels    
       II.1     Example of EM mitigation levels for an IP network service         
Appendix III – IEC Standards related to HPEM    
      III.1     Overview of the IEC HPEM Series         
Bibliography