Penetration testers are authorized personnel tasked with breaking into and finding vulnerabilities in computers and networks before outside intruders can cause harm.
Search your deck for a Defense card that removes an Attack card your opponent has in play. Show your opponent the drawn card, then put that card into your hand and shuffle the deck. Discard this card after shuffling.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.