An adversary is sending connection requests that are never completing the “Handshake” with the host. This DoS attack causes open ports to become saturated, disrupting access for legitimate users.
Select a System or Server card that your opponent has in play. That target cannot gain any points while this card is in play. At the beginning of your turn before playing any cards, you may change the target to a different System or Server.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.