This type of scan is used to gain information on a network without having a way to trace back to the original user. The attacker spoofs their IP address to make it appear they came from somewhere else.
Select an opponent. You may view 1 of their cards after they draw at the end of their turn.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.