8.1 Overview8.2 5G Security Threats and Challenges8.3 Development8.4 Security Implications in 5G Environments and Use Cases8.5 5G Security Layers8.6 Device Security8.7 Security Between Network Entities8.8 Security Opportunities for Stakeholders8.9 5G Security Architecture for 3GPP Networks8.10 UICC Evolution8.11 5G Security Development8.12 UICC VariantsReferences