Collegiate cyber defense competition where teams of 8 defend real-world networks
World's largest cyber defense competition cofounded with the Air Force to inspire students towards STEM careers
Individual or team network assessment and network defense competition where competitors vie for control of resources
Collegiate cyber defense competition where teams compete by securing provided virtual machines
Low- and no-cost professional training solutions through certification prep courses and cybersecurity awareness training.
Research-based cybersecurity courses aimed at helping individuals in states and communities nationwide to develop and improve their own cybersecurity programs
We customize training, host workshops, and conduct community-wide exercises to suit your organization’s individual needs
The Scholarship for Service (SFS) program is funded by the National Science Foundation (NSF) and provides support for individuals pursuing a computer or cybersecurity program. It requires the recipient to work for a federal, state, local, tribal, or territorial government for one year for every year of funding received.
Featured within the SFS booster pack is the rare “Scholarship for Service” asset card to help boost asset points, as well as other uncommon cards such as the “Polymorphic Malware” and “Spyware” attack cards.
An attacker managed to install spyware onto one of your opponent’s computer systems. Spyware covertly transmits information about a system, its data and user activities on that system to an attacker.
Select an opponent. That opponent loses 1 point per round for 2 rounds. Remove this card from play after 2 rounds.
Your opponent has been the target of a hacker who exploited a vulnerability and “spoofed” their login data so it appeared they were a legitimate user. The hacker has stolen critical data.
Select an opponent. That opponent loses 2 points per round until this card is countered.
One of your cybersecurity interns was selected by the CyberCorps program, which strengthens the educational development of information assurance professionals. This generous scholarship program provides funding for qualified individuals in exchange for their service in a government cybersecurity role.
You gain 2 points per round for 2 rounds. At the end of the second round, remove this card from play.
Your opponent clicked on a link which ran a program that encrypted all of their files and left a message demanding payment to get those files encrypted.
Select an Asset – System card that your opponent has in play. They receive no points from that Asset – System for 3 rounds. Remove this card from play after 3 rounds.
Planning is an essential component of any cybersecurity effort. Anticipating what might occur and preparing an appropriate response will increase your success rate against potential threats.
You may look at the top four cards in your deck and re-arrange them in any order, then discard this card.
Polymorphism means “to change the appearance of” something. This malware has the ability to redefine its signature, or how the code appears to anti-virus scanners, making it much more difficult to detect.
This card cannot be affected by Anti-Malware/Virus defense cards. Select an opponent. That opponent loses 2 points this round. Remove this card from play after 1 round.
Your opponent has forgotten to update their firewall rules, which will allow attackers to penetrate it using newer exploits.
Select a Firewall card that an opponent has in play and discard that card. Your opponent loses two (2) points this round. Remove this card from play after one (1) round.
You received an increase to your security budget and purchased newer and more powerful equipment.
Attach this card to an Asset – System card that you have in play. While the attached Asset – System is in play, it generates one (1) additional point each round.
You recently acquired a backup generator to keep your systems functioning in case of an electrical failure. Once this detects a loss of electricity, the generator immediately begins providing power until the electrical failure is fixed.
You may prevent one (1) Power Outage from affecting you. If you choose to do so, put this card at the bottom of your draw pile. You may only have one of this card in play.
You install or update anti-malware and anti-virus software on your computer systems. This prevents known viruses and other malicious software (malware), but needs to be updated periodically.
This card removes all Attack – Malware cards targeting you and remains in play. While this card is in play, you cannot be the target of Attack – Malware cards. You may only have one of this card in play.
This wireless router allows laptop computers and other wireless systems to be connected to the Internet through an Internet Service Provider (ISP).
This card allows unlimited Wireless type cards to be put into play.
A typical laptop computer that can be used to connect to the Internet via a Wireless Router.
You must have a Wireless Network type card in play before playing this card. You receive 1 point each round this card is in play.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.