Cyber threat analysis is a process in which internal and external vulnerabilities are investigated and matched against real-world cyber attacks.
This card can be played if your opponent has an Attack in play that can also be found in any discard pile. Discard that Attack card and this card from play.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.