One of your opponent’s data backup processes has not been closely monitored and it has been making corrupted copies for quite some time. All of the data copied from that machine is unusable.
Select a Data Backup card that an opponent has in play. When played, both this card and the target card are discarded.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.