Collegiate cyber defense competition where teams of 8 defend real-world networks
World's largest cyber defense competition cofounded with the Air Force to inspire students towards STEM careers
Individual or team network assessment and network defense competition where competitors vie for control of resources
Collegiate cyber defense competition where teams compete by securing provided virtual machines
Low- and no-cost professional training solutions through certification prep courses and cybersecurity awareness training.
Research-based cybersecurity courses aimed at helping individuals in states and communities nationwide to develop and improve their own cybersecurity programs
We customize training, host workshops, and conduct community-wide exercises to suit your organization’s individual needs
The Air Force STEM program is where students prove the sky is not the limit – it’s a starting point! This Air Force STEM booster pack exposes students to Air Force STEM opportunities and more. This booster brings back some old favorites and introduces new career cards, such as information security analyst and information security engineer.
Security operations centers, or SOCs, monitor and analyze activity on networks looking for anomalous activity. The SOC is responsible for ensuring that security incidents are correctly identified, analyzed, and defended.
When an Attack is played against you, you may play a Defense from your hand as an Event. On your next turn, you have 1 less playable card. When you play a Defense card while this card is in play you may discard one card from your hand and draw a new card.
An Insider Threat is someone who has authorized access and causes a negative impact to an organization either intentionally or unintentionally.
Remove a Personnel or a Defense – Software, excluding Attack – Personnel, that an opponent has in play. That opponent loses 2 points at the end of the round. Discard this card at the end of the round.
A job fair is an event in which multiple employers, recruiters, and schools meet in a public place to give information to potential employees.
When played, all players may search their deck for a Personnel type card and place it into their hand, then shuffle their deck. Discard this card.
An IT Auditor assesses an organization’s technology for potential issues with security, efficiency, and compliance.
Once per turn you may discard 1 card from the top of your deck and return a Defense card that is not a Personnel card from your discard pile to your deck. Shuffle your deck. Discard this card after you’ve used this effect twice.
The duties of an Information Security Specialist include developing plans to safeguard computer files against unauthorized tampering, managing computer anti-virus and malware protection systems, encrypting data transmission, and erecting firewalls.
Once per turn you may draw a card from your deck and reveal it to your opponent. If it is not a Defense – Software, discard that card. You can continue this effect until you draw a Defense – Software.
Much like a forensic investigator captures evidence from the scene of a crime, a digital forensic examiner gathers evidence found on computers, phones, and other digital devices.
While in play and once per round, when an opponent’s Attack targets an Asset that is not a Personnel, perform this effect. Draw 3 cards, discard any of those cards that is not a Defense.
A pocket-sized consumer device that allows for mobile connectivity to the Internet through cellular and wireless networks. Offers voice, VoIP and video calling, as well as messaging and access to mobile applications.
You gain 1 point each round.
Adversaries use internal spear phishing to gain additional information or to exploit users within the organization after gaining access to accounts or systems within the environment.
This attack can only be played if a Malware card is affecting your opponent or if your opponent has a Personnel card in play. If both requirements are met, remove 3 points this round. Otherwise, remove 2 points. Discard this card after 2 rounds.
Your opponent clicked on a link which ran a program that encrypted all of their files and left a message demanding payment to get those files encrypted.
Select an Asset – System card that your opponent has in play. They receive no points from that Asset – System for 3 rounds. Remove this card from play after 3 rounds.
An Information Security Analyst (ISA) is responsible for the protection of several computer systems and networks.
Choose one:
At the start of each round, select one of your Defense cards in play. It cannot be discarded this round by any opponent while this card is in play.
OR
Select an Asset card from your discard pile that is not a Personnel type and shuffle it into your deck. Discard this card at the end of the round.
An attacker has used an undocumented security vulnerability, or zero-day exploit, to gain access to your opponent’s network through their affected server. Investigation of this issue has only just begun. No official solutions or patches yet exist to defend against this exploit.
Select an Asset – Server that an opponent has in play. That player loses 5 points this round. Discard this card at the end of the round.
Zeus is a powerful trojan horse, which steals private data such as passwords, system information, banking credentials and other financial data from the infected system.
Select an opponent. Your selected opponent loses 2 points per round until this Trojan Horse is countered.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.