Technical intelligence gathering includes, but is not limited to, understanding the target’s network architecture, IP space, network services, email format and security procedures.
When played, add each of your opponent’s Assets and Defenses and subtract the two. The difference will be the number of cards they discard from the top of their deck to a maximum of 4. Discard this card at the end of the round.
The CIAS was established at UT San Antonio in June of 2001 as part of UT San Antonio’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.