Rootkits are often used to conceal their presence or the presence of other malware. Application rootkits operate at the level of standard programs making them easier to detect than other types of rootkits.
This card is immune to Defense – Software cards. When your Malware is removed from play by an opponent’s Defense card, you may discard this rootkit and place one Malware back in your hand.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.