Significant Risk Of Telecommunications Exploitation
- Exists (a) when information of high value to an adversary may be handled by the telecommunication system and (b) when there is a high potential threat to or a readily exploitable vulnerability in the system. (NCSC-1 1)