This type of scan is used to gain information on a network without having a way to trace back to the original user. The attacker spoofs their IP address to make it appear they came from somewhere else.
Select an opponent. You may view 1 of their cards after they draw at the end of their turn.
The CIAS was established at UT San Antonio in June of 2001 as part of UT San Antonio’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.