1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Supplement
4 Abbreviations and acronyms
5 Conventions
6 Background
7 Security threats for operation
8 Security requirements
9 Security countermeasures
9.1 Detection and recognition
9.2 Protection
9.3 Security audit and recovery
Appendix I – A practice of MVNO security
Bibliography