A malicious attacker has gained access to one of your opponent’s machines and destroyed all of the data files stored on that device.
Select an Asset – Server that an opponent has in play. All Asset – Data cards currently attached to that opponent’s Asset – Server are removed from play. Remove Data Destruction from play after use.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.