Credential access allows adversaries to control an account on the network, and makes it harder for defenders to detect the adversary.
Select an Attack – Hack card you control. If that card would discard itself after “x” rounds, instead leave it in play until removed by other means.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.