4
(35) Decryption: reverse of encryption;
(36) Denial of service: attack by saturation of a resource of the information system or
electronic communication network to make it collapse and unable to provide expected
services;
(37) Distributed Denial of Service: simultaneous attack of the resources of an information
system or electronic communication network in order to saturate and amplify the effects of
interference;
(38) Availability: security criterion of resources of electronic communication networks,
information systems and terminal equipment being accessible and usable as required (time
factor);
(39) Device for electronic signature creation: equipment and/or .private encryption software
certified by a competent authority, configured to create an electronic signature;
(40) Device for electronic signature verification: equipment and/or public encryption
software certified by a competent authority used by a certifying authority to verify electronic
signatures;
(41) Data: representation of facts, information or concepts in a form suitable for processing
by terminal equipment, including a program allowing it to perform a function;
(42) Connection data: data relating to the access process in an electronic communication;
(43) Traffic data: data relating to an electronic communication indicating the origin,
destination, route, time, date, size and duration or type of underlying service;
(44) Terminal equipment: equipment, installation or facilities to be connected to the
endpoint of an information system which broadcasts, receives, processes and stores
information data;
(45) Reliability: ability of an information system or electronic communication's network to
operate without any incident for a very long time;
(46) Provider of electronic communication services : natural person or corporate body
providing services consisting entirely or mainly in the provision of electronic
communications;
(47) Impact severity: assessment of the gravity of an incident, weighted by its frequency of
occurrence;
(48) Data integrity: safety criterion defining the status of an electronic communication's
network, an information system or terminal equipment that remains intact and helps ensure
that resources have not been altered (modified or destroyed) intentionally and accidentally to
ensure their accuracy, reliability and durability;
(49) Unlawful interception: illegal or unauthorized access to the data of an electronic
communication's network, an information system or a terminal equipment;

Select target paragraph3