Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation.
Select an opponent’s Asset – System card that is in play. If that Asset is removed, discard this card. Each time your opponent plays an Asset or Defense card, select one card in their hand to view. Your opponent loses 1 point at the end of each round.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.