Public WiFi connections found in stores are desirable by hackers as they allow for access without authentication. This can give them access to all the unsecured devices connected to the network.
Select an opponent’s Asset – Wireless or Mobile Card. That card’s value becomes -1 for 2 turns.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.