availability

Relates to the likelihood that a service or application is running and available for exploit at the time of attack. The possible values for this field are: Always, Time Dependent, User Initiated, or Circumstantial.