The glossary below contains many of the terms you will find in common use throughout the Symantec Security Response website. Please refer to this list to find definitions of terms and answers to other Internet security-related questions.


Assets are only used by applications. They are not directly accessed by the user. An asset can depend on other assets. Examples include: data, configurations, file systems, volumes, LUNs, physical storage, servers, SQL instances inside Share point, or Oracle databases inside SAP.

A managed object in the system that has value, has an owner, has controlled access, and can have authority. The authority occurs when the asset is a person or a query engine.

A function, a capability, a piece of equipment, or information that is important to a mission, such as a word-processing application, network router, facsimile machine, data source, or computer. The ability to send a message to a command and control organization thousands of miles away in five seconds is also an asset.