1
Scope
2 References
3 Definitions
3.1 Terms defined
elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Applying the X.805 concepts to
the networks and end-user equipment
6.1 Three security layers
in a network and in the end-user equipment
6.2 Classification of
security controls in telecommunication
6.3 Roles of network and
users
6.4 Applicability of the
security architecture components to network and users
7 Capabilities for further
division of the security controls
8 Relationship to other ITU-T
Recommendations concerning security
Annex A – Possible composition of technical facilities of
network and users
Bibliography