The glossary below contains many of the terms you will find in common use throughout the Symantec Security Response website. Please refer to this list to find definitions of terms and answers to other Internet security-related questions.


Relates to the likelihood that a service or application is running and available for exploit at the time of attack. The possible values for this field are: Always, Time Dependent, User Initiated, or Circumstantial.