Your opponent’s network has been infiltrated by a malicious person. They had access for a long time but remained undetected until they could achieve their goal. Your opponent’s valuable data is stolen often.
Select an opponent that is currently affected by a Trojan Horse card. That opponent loses 4 points this round. Remove this card from play after 1 round.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.