Perform audits or scans of systems, permissions, insecure software and insecure configurations to identify potential weaknesses.
Return an Asset – System card you have in play to your hand. For each other Defense you have in play, you may select 1 card in your hand and place it on the bottom of your deck and draw a card. Shuffle your deck and discard this card at the end of the round.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.