The duties of an Information Security Specialist include developing plans to safeguard computer files against unauthorized tampering, managing computer anti-virus and malware protection systems, encrypting data transmission, and erecting firewalls.
Once per turn you may draw a card from your deck and reveal it to your opponent. If it is not a Defense – Software, discard that card. You can continue this effect until you draw a Defense – Software.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.