Icdl It Security QRG - v1.0
Icdl It Security QRG - v1.0
1 Security Concepts • Availability - Ensures the availability of • Guidelines and policies are typically
information resources provided to staff on joining a company
1.1 Data Threats 1.2.2 Understand the reasons for protecting personal with current versions available from the IT
1.1.1 Distinguish between data and information. information like: department, human resources department
• Data is unprocessed information for data • Avoiding identity theft - Personal information or the company intranet or portal.
processing. Data may be a collection of can be misused for identity theft
unprocessed numbers, text, or images. • Avoiding fraud - Personal information can be 1.3 Personal Security
• Information is the processed output of data used fraudulently 1.3.1 Understand the term social engineering.
making it meaningful to the person who • Maintaining privacy - Personal information can • Social engineering involves manipulating
receives it. be disclosed without permission people into performing actions or divulging
1.1.2 Understand the terms cybercrime, hacking. 1.2.3 Understand the reasons for protecting confidential information, rather than
• Cybercrime involves using the Internet or workplace information on computers and obtaining the information by hacking.
a computer to carry out illegal activities, devices like: 1.3.1 Understand the implications of social
often for financial or personal gain. • Preventing theft - Stopping client or sensitive engineering like:
Examples include identity theft and social company information being stolen • Unauthorised computer and device
engineering. • Preventing fraudulent use - Stopping client or access - Potentially accessing confidential
• Hacking involves using computer expertise financial information being used fraudulently information without permission
to gain access to a computer system • Preventing accidental loss of data - Stopping • Unauthorised information gathering
without authorisation. The hacker may wish workplace information being lost by accident - Collecting information that may be
to tamper with programs and data on the • Preventing sabotage - Stopping workplace confidential or valuable without permission
computer, use the computer’s resources, or information being deliberately damaged or • Fraud - Using gathered information to
just prove they can access the computer. destroyed by employees or competitors commit an act of deception
1.1.3 Recognise malicious, accidental threats to 1.2.4 Identify common data/privacy protection, 1.3.2 Identify methods of social engineering like:
data from: retention and control principles like: • Phone calls - Misleading someone about
• Individuals - Could steal or accidentally • Transparency - Data subjects have the right to your identity in a phone call to gain valuable
delete data such as new product be informed if data controllers process their information
information or important reports data. • Phishing - Misleading someone about your
• Service providers - Could lose, destroy, or • Legitimate purposes - Data controllers can identity online to gain valuable information
steal valuable company or personal data only process data for specified and legitimate • Shoulder surfing - Using direct observation
• External organisations - Could gain access purposes. such as looking over someone’s shoulder
to a computer system and steal or delete • Proportionality - Data controllers should only to get information
data process data for an intended purpose, avoiding 1.3.3 Understand the term identity theft and its
1.1.4 Recognise threats to data from excessive additional processing. implications.
extraordinary circumstances. 1.2.5 Understand the terms data subjects and data • Identity theft involves assuming another
• Extraordinary circumstances are natural controllers. person’s identity for personal gain.
disasters or unforeseen events that can • Data subjects are individuals who provide their • It can lead to the theft or misuse of
threaten data like: personal data to a data controller. personal, financial, business or legal
• Fire • Data controllers are people or entities who information.
• Floods control the content and use of personal data. 1.3.4 Identify methods of identity theft like:
• War 1.2.5 Understand how data/privacy protection, • Information diving - Recovering information
• Earthquake retention and control principles apply to data from discarded material
1.1.5 Recognise threats to data from using cloud subjects and data controllers. • Skimming - Using a scanner device to skim
computing like: • Data subjects have rights such as information, often from a credit/debit card
• Data control - Access to data could be • being informed of any data processing where • Pretexting - Gaining personal information
restricted or unauthorised access allowed they are the data subject through deception
leading to malware issues • accessing data about themselves
• Potential loss of privacy - More people • Data controllers are required to observe several 1.4 File Security
could have access to data and could principles such as 1.4.1 Understand the effect of enabling/disabling
compromise personal (images, videos) or • processing data fairly and lawfully macro security settings.
financial (credit card information) data • only collecting and using data for legitimate • Enabling a macro will ensure that the macro
purposes will run but may harm the computer if the
1.2 Value of Information • keeping data up to date source of the file is unknown.
1.2.1 Understand basic characteristics of • not keeping data longer than necessary • Disabling a macro will ensure the macro will
information security like: • enabling data subjects to fix, erase or block not run but may prevent you from using all
• Confidentiality - Ensures information is incorrect data about them the features of a file.
protected against unauthorised access or 1.2.6 Understand the importance of adhering to 1.4.2 Understand the advantages and limitations
disclosure guidelines and policies for ICT use and how to of encryption.
• Integrity - Ensures the trustworthiness of access them. • Advantages:
information resources and that they cannot • Guidelines and policies provide a standard for • Encrypted data cannot be read without a
be modified without authorisation users on how ICT should be used to protect the key.
organisation’s data.
© 2015, ICDL Foundation. This Quick Reference may be used by candidates to assist in preparation for the ICDL module test for IT Security Syllabus Version 2.0. ICDL Foundation does not warrant that use of this guide will ensure
passing of the test. Screen shots used with permission from Microsoft. Tool and application-specific details are correct as of May 2015. Online tools and applications are subject to frequent update and change.
• Only an authorised receiver can read the understand how they work like: channels to allow for sharing of resources
message. • Adware - Automatically plays, displays, or and information.
• Limitations: downloads advertisements to a computer 3.1.1 Recognise the common network types like:
• If the encrypted key is lost, the data • Ransomware - Restricts access to files, • Local area network (LAN) - A wired network
becomes unusable. computers or devices until the user pays a that connects computers and devices in
1.4.2 Be aware of the importance of not demanded ransom close proximity, usually in the same building
disclosing or losing the encryption • Spyware - Collects information on user browser • Wireless local area network (WLAN) - A
password, key, or certificate. habits without their consent wireless network that connects computers
• Disclosing - Could lead to data theft or • Botnets - Infect and control a number of and devices in close proximity, usually in
misuse computers without consent for malicious the same building
• Losing - Could lead to the data becoming purposes • Wide area network (WAN) - A network that
inaccessible • Keystroke logging - Captures information that is connects computers and devices over a
1.4.3 Encrypt a file, folder. typed on a keyboard long distance, using telephone lines and
• Select the file, folder to encrypt. • Diallers - Install onto computers and attempt to satellite communications
• Click File and click Properties. dial premium telephone lines at other locations • Virtual private network (VPN) - A private
• On the General tab, click the Advanced network typically accessed using the
button. 2.2 Protection Internet to allow users to privately share
• Check the Encrypt contents to secure data 2.2.1 Understand how anti-virus software works and information between remote locations, or
check box. its limitations. between a remote location and a business’
• Click OK twice. • Anti-virus software uses scans to detect and home network
1.4.3 Encrypt a drive. block viruses before they infect a system. 3.1.2 Understand how connecting to a network
• Click the Start button. • Anti-virus software needs to be kept up to has implications for security like:
• Click Control Panel. date with definition files. It cannot always stop • Computers connected to a network may be
• Click Security. attacks to system vulnerabilities or security infected with malware.
• Click BitLocker Drive Encryption. flaws. • Connecting to a network may result in
• Click Turn On BitLocker. 2.2.2 Understand that anti-virus software should be unauthorised data access.
• Follow the setup wizard to complete the installed on computers and devices. • Connecting to a network may increase the
encryption setup. • Up-to-date anti-virus software should always challenge of maintaining privacy.
1.4.4 Set a password for documents. be installed and enabled on all computers and 3.1.3 Understand the role of the network
• Click File. devices to protect against virus threats. administrator.
• On the Info tab, click Protect Document. 2.2.3 Understand the importance of regularly • They are involved in managing the
• Click Encrypt with Password. updating software like: authentication, authorisation and
• Anti-virus - Update regularly to detect new accounting within a network.
viruses • They maintain staff access to required data
• Web browser, plug-in, application, operating on the network and ensure network usage
system - Update regularly to receive the latest is in line with ICT policy.
support to fix known problems and security • Their tasks include monitoring and installing
risks relevant security patches and updates,
2.2.4 Scan specific drives, folders, files using anti- monitoring network traffic and dealing with
virus software. malware found within a network.
• Open the anti-virus application. 3.1.4 Understand the function of a firewall in a
• Select the Drives, Folders, Files to scan. personal, work environment.
• Click Scan. • A firewall is used to protect a personal or
2.2.4 Schedule scans using anti-virus software. work network from intrusions from outside
• Open the anti-virus application. sources.
• Click Settings. 3.1.4 Understand the limitations of a firewall in a
• Set the frequency, approximate time and type personal, work environment.
of scan. • Does not always provide automatic
• Click Save. notification if a network is hacked
2.2.5 Understand the risks of using obsolete and • Cannot protect against an attack generated
• Enter a password and click OK. unsupported software like: from within the network
• Reenter the password and click OK. • Increased malware threats - Software that • May restrict some legitimate traffic
1.4.4 Set a password for spreadsheets. contains flaws and security vulnerabilities can 3.1.5 Turn a personal firewall on, off.
• Click File. be open to more malware threats. • Click the Start button.
• On the Info tab, click Protect Workbook. • Incompatibility - Software that cannot • Click Control Panel.
• Click Encrypt with Password. communicate with newer software and • Click the Windows Firewall button.
• Enter a password and click OK. hardware can have problems functioning. • In the left panel, click Turn Windows
• Reenter the password and click OK. Firewall on or off.
1.4.4 Set a password for compressed files. 2.3 Resolving and Removing • Click the appropriate option.
• On the Home tab, select Encrypt. 2.3.1 Understand the term quarantine and the effect • Click OK.
• Select the files, folders to zip. of quarantining infected/suspicious files. 3.1.5 Allow an application, service/feature
• Click Zip. • Quarantining a file moves it to a safe location on access through a personal firewall.
• Enter a password and reenter the a drive managed by the anti-virus software. • Click the Start button.
password. • The file can be restored or deleted from • Click Control Panel.
• Click OK. quarantine if required. • Click the Windows Firewall button.
2.3.2 Quarantine, delete infected/suspicious files. • In the left panel, click Allow a program or
2 Malware • Click the Start button.
• Click Control Panel.
feature through Windows Firewall.
• Click Change settings.
• Click the Windows Defender button. • Check the check box next to the program
2.1 Types and Methods • Click Scan. or feature you want to allow.
2.1.1 Understand the term malware. • Click Full Scan. • Check the check box of the network
• Malware is malicious software that is • Click Review detected items to view any locations you want to allow communication
designed to install itself on a computer or potential threats detected by the scan. on.
device without the owner’s consent. • Click the Action drop-down and click • Click OK.
2.1.1 Recognise different ways that malware can Quarantine or Remove. 3.1.5 Block an application, service/feature
be concealed on computers and devices • Click Apply actions. access through a personal firewall.
like: 2.3.3 Understand that a malware attack can be • Click the Start button.
• Trojans - Non self-replicating malware that diagnosed and resolved using online resources • Click Control Panel.
pretend to be harmless applications like: • Click the Windows Firewall button.
• Rootkits - Malware that enable continued • Websites of operating system software • In the left panel, click Allow a program or
access to computers or devices while providers - Provide software patches and feature through Windows Firewall.
hiding their presence updates • Click Change settings.
• Backdoors - Malware that bypass system • Websites of anti-virus software providers - • Uncheck the check box next to the
security to gain unauthorised remote Provide software updates program or feature you want to block.
access to computers • Websites of web browser software providers - • Uncheck the check box of the network
2.1.2 Recognise types of infectious malware Provide browser updates locations you want to block communication
and understand how they work like: • Websites of relevant authorities - Provide help on.
• Viruses - Malware that can replicate when and guidance documentation • Click OK.
triggered by a human action and cause
damage to a computer 3.2 Wireless Security
• Worms - Self-replicating malware that uses 3 N
etwork Security 3.2.1 Recognise different options for wireless
a computer network to send copies of itself security and their limitations like:
to other computers 3.1 Networks and Connections • Wired Equivalent Privacy (WEP) -
2.1.3 Recognise types of data theft, profit 3.1.1 Understand the term network. Limitations include a small number of
generating/extortion malware and • A network is a group of two or more computer possible values available, some weak and
systems linked together by communication easily cracked values, and keys remaining
static leading to repeat use. 4.1.4 Understand that a network account should be: 5.2.2 Identify ways to confirm the authenticity of
• Wi-Fi Protected Access (WPA) / Wi-Fi • Accessed through a user name and password a website like:
Protected Access 2 (WPA2) - Limitations • Locked or logged off when not in use • Content quality - Ensure the website is free
include possibly needing to update older 4.1.5 Identify common biometric security techniques from spelling and grammar mistakes.
wireless access points and software, WPA used in access control like: • Currency - Ensure the website is regularly
being hacked with advanced tools, and • Fingerprint scanning updated and shows a recent date.
WPA2, though more secure, can slow down • Eye scanning • Valid URL - Ensure the URL matches the
computer or device performance. • Face recognition company name e.g. www.paypal.com and
• Media Access Control (MAC) filtering - • Hand geometry not www.ppaypal.com.
Limitations include difficulty keeping track • Company or owner information - Ensure
of addresses with many devices. 4.2 Password Management that detailed company or owner information
• Service Set Identifier (SSID) hiding - 4.2.1 Recognise good password policies, like: is visible on the website.
Limitations include software utilities finding • Adequate password length • Contact information - Ensure the contact
the hidden SSID. • Adequate letter, number and special characters information e.g. address, telephone and
3.2.2 Understand that using an unprotected mix e-mail are visible. Contact the company
wireless network can lead to attacks like: • Not sharing passwords using these details to double check that
• Eavesdroppers - Other people accessing • Changing them regularly they are authentic.
and reading your data to find sensitive or • Different passwords for different services • Validating domain owner - Validate the
confidential information 4.2.2 Understand the function of password manager domain owner using a website checking
• Network hijacking - Other people taking software. service such as whois.com.
control of network communications • Password manager software is used to store • Security certificate - Make sure the website
• Man in the middle - Other people observing multiple usernames and passwords securely is secure (https://www.example.com) and
communications and collecting data that is in one place. One master password is used to has a valid security certificate (click on the
transmitted open the software and gain access to multiple padlock symbol to access the certificate).
3.2.3 Understand the term personal hotspot. usernames and passwords.
• A personal hotspot enables a mobile device 4.2.2 Understand the limitations of password
to share its internet/data connection with manager software.
other devices. • Spyware or hackers only have to guess one
3.2.4 Enable a secure personal hotspot. password to gain access to multiple usernames
Example - iOS: and passwords. 5.2.3 Understand the term pharming.
• Click Settings. • Pharming is an attack that redirects a
• Click Mobile. website’s traffic to a fake website without
• Click Personal Hotspot within Mobile Data 5 S
ecure Web Use the user or website’s knowledge or consent
Network. in order to steal the information they enter,
• Enter an APN, Username and Password. 5.1 Browser Settings such as their bank details.
• Click Settings. 5.1.1 Select appropriate settings for enabling, 5.2.4 Understand the function and types of
• Click Personal Hotspot. disabling autocomplete when completing a content-control software like:
• Click the slider to turn on. form. • Internet filtering software - Designed to
3.2.4 Disable a secure personal hotspot. • Click the Tools button on the Command bar. filter and monitor access to websites to
• Click Settings. • Click Internet Options. make undesirable content unavailable to
• Click Personal Hotspot. • Click the Content tab. the user
• Click the slider to turn off. • Click Settings beside AutoComplete. • Parental control software - Used to restrict
3.2.4 Securely connect devices to a secure • Check or uncheck the AutoComplete options as the time spent on the Internet and the type
personal hotspot. required. of content accessed
• Click Settings. • Click OK.
• Click Wi-Fi. 5.1.1 Select appropriate settings for enabling,
• Click the name of the personal hotspot.
• Enter the Wi-Fi Password.
disabling autosave when completing a form.
• Click the Tools button on the Command bar. 6 C
ommunications
• Click Done. • Click Internet Options.
3.2.4 Securely disconnect devices from a secure • Click the Content tab. 6.1 E-Mail
personal hotspot. • Click Settings beside AutoComplete. 6.1.1 Understand the purpose of encrypting,
• Click Settings. • Check or uncheck the AutoComplete options decrypting an e-mail.
• Click Wi-Fi. for saving user names and passwords as • Encrypting and decrypting an e-mail ensure
• Click Disconnect Wi-Fi Clients. required. that only the intended recipient can read it.
• Click OK. 6.1.2 Understand the term digital signature.
5.1.2 Delete private data from a browser like: • A digital signature is a mathematical
4 Access Control browsing history, download history, scheme used to validate the authenticity of
cached Internet files, passwords, cookies, a message.
4.1 Methods autocomplete data. 6.1.3 Identify possible fraudulent e-mail,
4.1.1 Identify measures for preventing • Click the Tools button on the Command bar. unsolicited e-mail.
unauthorised access to data like: • Click Internet Options. • A fraudulent or unsolicited e-mail may
• User name - A unique name given to • On the General tab, in the Browsing history contain a virus or malware, or be an
authorised users field, click the Delete button. attempt to gain information from the
• Password - A string of characters used for • Check or uncheck the Browsing history options recipient and should not be opened.
authentication, to prove identity or gain as required. 6.1.4 Identify common characteristics of
access to a resource phishing like:
• PIN - A personal identification number, • Using names of legitimate organisations,
used as a numeric password for people
authentication, to prove identity or gain • Using false web links, logos, branding
access to a resource • Encouraging disclosure of personal
• Encryption - The process of encoding data information
to make it unintelligible to any unauthorised 6.1.5 Be aware that you can report phishing
person who tries to read the data attempts to the legitimate organisation,
• Multi-factor authentication - Uses two relevant authorities.
or more independent authentication • Phishing attempts can be reported to
credentials from the following: legitimate organisations (bank, online
• What the user knows (password or PIN) retailer) or relevant authorities (government
• What the user has (security token or security agency).
smart card) 6.1.6 Be aware of the danger of infecting a
• What the user is (biometrics) computer or device with malware:
4.1.2 Understand the term one-time password • By opening an e-mail attachment that
and its typical use. contains a macro
• A one-time password is valid for only • By opening an e-mail attachment that
one login session or transaction, offering contains an executable file
enhanced security.
• It is typically used when accessing 5.2 Secure Browsing
important data, for example from a VPN or 5.2.1 Be aware that certain online activity
when carrying out financial transactions. (purchasing, banking) should only be
4.1.3 Understand the purpose of a network undertaken on secure web pages using a
account. secure network connection.
• A network account provides network • Purchasing - For example online shopping
security by only allowing users with unique • Banking - For example online banking, fund
network accounts to access the network. transfers
6.2 Social Networking permission to access personal data such as 7.1.5 Restore data from a backup location like:
6.2.1 Understand the importance of not contacts, images, and location without the local drive, external drive/media, cloud
disclosing confidential or personal user’s knowledge. service.
identifiable information on social • Poor quality - Insufficient testing and lack • Click the Start button.
networking sites. of quality control can lead to poor quality • Click Control Panel.
• Confidential information can include applications and device instability. • Click the Backup and Restore button.
passwords, PIN numbers, certain company • Hidden costs - Users can unknowingly sign up • Click Restore My Files.
information, and client details. to contracts or in-application purchases that • Select the files or folders (or items) to
• Personal identifiable information can charge large amounts of money. restore by using Search, Browse for Files or
include full name, home address, national 6.4.2 Understand the term application permissions. Browse for Folders.
identification number, and date of birth. • Application permissions are requested
• Disclosing such information could lead to by an application during installation to
personal information, company information, allow it to access data such as location,
client information or finances being stolen personal information, storage, and network
or misused. communication. The user should consider if
6.2.2 Be aware of the need to apply and regularly the application needs these permissions before
review appropriate social networking authorising them.
account settings like: 6.4.3 Be aware that mobile applications can extract
• Account privacy - Privacy settings can private information from the mobile device like:
be customized to show different personal • Contact details - Can be accessed by the
details to different people or groups in application and used for their own purposes
order to protect the user’s privacy. • Location history - Can be recorded using the
• Location - Location settings can be device GPS
adjusted to show or hide the user’s • Images - Can be accessed and used without
location. the user’s knowledge
• Regularly review settings to ensure they are 6.4.4 Be aware of emergency and precautionary • Click Next.
appropriate. measures if a device is lost like: • Choose to restore In the original location or
6.2.3 Apply social networking account settings: • Remote disable - Can be installed or enabled In the following location to choose a new
account privacy on the device so that the device can be location.
Example - Facebook: disabled remotely. The data will remain on the • Click Restore.
• Click in the upper-right corner of the local drive.
social network site page. • Remote wipe - Can be installed or enabled on 7.2 Secure Deletion and Destruction
• Click Settings from the drop-down menu. the device so that the device data can be wiped 7.2.1 Distinguish between deleting and
• Click Privacy on the left. remotely so it is no longer accessible. permanently deleting data.
• Click a setting to edit it. • Locate device - Can be installed or enabled on • Deleting data by moving it to the recycle
6.2.3 Apply social networking account settings: a device so that the device can be tracked and bin does not permanently destroy the data.
location found using GPS to provide the coordinates of • Permanently deleting data by shredding
• Go to a post on the Timeline. the device location. or degaussing ensures that it cannot be
• Click v and select Change Location. recovered.
• Click x to remove it. 7.2.2 Understand the reasons for permanently
• Click OK. 7 Secure Data Management deleting data from drives or devices.
6.2.4 Understand potential dangers when using • Preventing identity theft
social networking sites like: 7.1 Secure and Back up Data • Protecting valuable or confidential company
• Cyber bullying - Harming other people, in 7.1.1 Recognise ways of ensuring physical security information from being discovered by a
a deliberate, repeated, and hostile manner of computers and devices like: third party
through the site • Do not leave computers or devices unattended • Disposing of the drive or device safely
• Grooming - Befriending a person through to avoid theft. • Reassuring clients, customers or individuals
the site, in the negative context of • Log equipment location and details to track that their data has been permanently
preparing them to accept inappropriate them. deleted
behaviour • Use cable locks to secure computers and 7.2.3 Be aware that content deletion may not be
• Malicious disclosure of personal content devices safely. permanent on services like:
- Maliciously circulating personal content, • Implement access control measures such as • Social network site - Deleted content may
such as images and videos, of other users swipe cards, biometric scans. be deleted from the page but still exist in
• False identities - Assuming a false user 7.1.2 Recognise the importance of having a backup other posts or on the provider’s server.
identity to contact or trick other users procedure in case of loss of data from • Blog - Deleted blog posts may still exist on
• Fraudulent or malicious links, content, computers and devices. the provider’s server or be searchable as
messages - Sending links, content or • Backup procedures will ensure that data can be cached web pages.
messages to get information from other recovered from a backup copy if it is lost from a • Internet forum - Deleted Internet forum
users computer or device. posts may still exist on the provider’s
6.2.5 Be aware that you can report inappropriate 7.1.3 Identify the features of a backup procedure server, in other forum posts where they
social network use or behaviour to the like: have been quoted or be searchable as
service provider, relevant authorities. • Regularity/frequency - Set up how often you cached web pages.
• Inappropriate social network use or want a back-up to occur. • Cloud service - Deleted data may be stored
behaviour can be reported to the service • Schedule - Set up a back-up schedule. on multiple servers in various locations and
provider (social network) or relevant • Storage location - Set up a location to store also be recoverable in case of accidental
authorities (police, government agency). your back-up to like an external hard drive. deletion.
• Data compression - Choose from any available 7.2.4 Identify common methods of permanently
6.3 VoIP and Instant Messaging compression options. deleting data like:
6.3.1 Understand the security vulnerabilities of 7.1.4 Back up data to a location like: local drive, • Shredding - Shredding disks like CDs/DVDs
instant messaging (IM) and Voice over IP external drive/media, cloud service. • Drive/media destruction - Physically
(VoIP) like: • Click the Start button. destroying drives or media
• Malware access • Click Control Panel. • Degaussing - Leaving the magnetic
• Backdoor access • Click the Backup and Restore button. domains on a disk in random patterns
• Access to files • Click Set up Backup. rendering previous data unrecoverable
• Eavesdropping • Select a back-up location (drive/network) and • Using data destruction utilities - Using a
6.3.2 Recognise methods of ensuring click Next. software utility for destroying data on a
confidentiality while using IM and VoIP like: • Select the data to back up or accept the drive
• Encryption recommended default settings.
• Non-disclosure of important information • Select the back-up schedule.
• Restricting file sharing
6.4 Mobile
6.4.1 Understand the possible implications
of using applications from unofficial
application stores like:
• Mobile malware - Can be created by
individuals to rapidly spread malware,
which is facilitated by a lack of technical
support or application store quality
controls. For more information,
• Unnecessary resource utilisation - May not visit: www.icdl.org
be fully tested and quality approved and
can slow down a mobile device and other
applications.
• Access to personal data - May • Save Settings and Backup.
automatically give the application
© 2015, ICDL Foundation. This Quick Reference may be used by candidates to assist in preparation for the iCDL module test for IT Security Syllabus Version 2.0. iCDL Foundation does not warrant that use of this guide will
ensure passing of the test. Screen shots used with permission from Microsoft. Tool and application-specific details are correct as of May 2015. Online tools and applications are subject to frequent update and change.