2

(5) Symmetric algorithm: cipher algorithm using the same key to cipher and decipher
messages;
(6) Active attack: action modifying or altering the resources targeted by the attack (violation
of the integrity and confidentiality of data);
(7) Passive attack: action that does not alter its target (eavesdropping, invasion of privacy);
(8) Integrity violation: action carried out intentionally to substantially disrupt or disable an
information system, electronic communication network or terminal equipment by inputting,
transmitting, damaging, deleting, deteriorating, altering suppressing or making data
inaccessible;
(9) Security audit: systematic examination of components and security actors, policies,
actions, procedures and resources used by an organization to protect its environment, conduct
compliance tests controls to assess the adequacy of (organizational, technical, human and
financial) resources allocated for risks, optimization, efficiency and performance;
(10) Authentication: safety criteria defined using a specific process to verify the identity of a
person or entity and ensure that the identification given corresponds to the identity of the
person initially registered;
(11) Certification Authority: trusted authority responsible for the creation and assignment of
public and private keys and electronic certificates;
(12) Root Certification Authority: structure put in place in charge of the mission of
accreditation of certification authorities, validating certification policy of certification
authorities accredited, validating and signing certification authorities accredited certificates,
(13) Digital certificate: electronic record secured by the electronic signature of the person
who issued it after ensuring that it certifies the authenticity of its contents;
(14) Qualified electronic certificate: digital certificate issued by a licensed Certification
Authority;
(15) Electronic certification: issuance of electronic certificates;
(16) Cipher: the transformation of information using a secret key to make it illegible to
anyone except those possessing special knowledge of the key;
(17) Key: in a cipher system, it corresponds to a mathematical value, a word, or a phrase
which enables the ciphering or deciphering of a message with the help of the encryption
algorithm;
(18) Private key: key used in asymmetric cipher mechanism (or public key cipher) which
belongs to an entity and kept secret;
(19) Public key: used to cipher a message in an asymmetric system distributed freely;

Select target paragraph3