An unauthorized user on one of your opponent’s machines is transferring sensitive data to an external network, compromising the confidentiality of that data and damaging their reputation.
Select an Asset – Server that an opponent has in play. That opponent loses 4 points at the end of this round for each Asset – Data card attached to the target server. Remove this card from play at the end of this round.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.