Security operations centers, or SOCs, monitor and analyze activity on networks looking for anomalous activity. The SOC is responsible for ensuring that security incidents are correctly identified, analyzed, and defended.
When an Attack is played against you, you may play a Defense from your hand as an Event. On your next turn, you have 1 less playable card. When you play a Defense card while this card is in play you may discard one card from your hand and draw a new card.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.