Sensors installed on your network allow cyber analysts the visibility they need to assess network anomalies, track trends and detect threats before they do harm.
When an opponent plays an Attack card that targets you, you may select one card at random to view in that opponent’s hand. If the selected card is an Attack card, discard it and this card.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.