When flood volumes exceed the capacity of the network connection, it is necessary to intercept the incoming traffic to filter out the attack traffic from the legitimate traffic. Such defenses can be provided by the hosting Internal Service Provider (ISP).
Search your deck for a Firewall card. Place it in your hand and shuffle your deck. For each ISP that you have in play, gain 1 point to a maximum of 3 points. Discard this card at the end of the round.
The CIAS was established at UT San Antonio in June of 2001 as part of UT San Antonio’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.