Phishing attacks often involve emails that appear to come from a trustworthy source; however, they are actually sent by malicious actors attempting to obtain information they shouldn’t have.
Select an opponent. That opponent loses 1 point per round.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.