When flood volumes exceed the capacity of the network connection, it is necessary to intercept the incoming traffic to filter out the attack traffic from the legitimate traffic. Such defenses can be provided by the hosting Internal Service Provider (ISP).
Search your deck for a Firewall card. Place it in your hand and shuffle your deck. For each ISP that you have in play, gain 1 point to a maximum of 3 points. Discard this card at the end of the round.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.