{"id":316,"date":"2025-02-02T18:07:05","date_gmt":"2025-02-02T18:07:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/?page_id=316"},"modified":"2025-02-02T18:23:34","modified_gmt":"2025-02-02T18:23:34","slug":"photo-gallery-on-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/photo-gallery-on-cybersecurity\/","title":{"rendered":"Photo Gallery on Cybersecurity"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0642-1024x768.jpg\" alt=\"\" class=\"wp-image-322\" srcset=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0642-1024x768.jpg 1024w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0642-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0642-768x576.jpg 768w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0642-1536x1151.jpg 1536w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0642-2048x1535.jpg 2048w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0642-400x300.jpg 400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Source:<\/strong> <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-infographic\/\" data-type=\"link\" data-id=\"https:\/\/cybersecurityventures.com\/cybercrime-infographic\/\">https:\/\/cybersecurityventures.com\/cybercrime-infographic\/<\/a> <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"767\" src=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0644-1024x767.jpg\" alt=\"\" class=\"wp-image-323\" srcset=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0644-1024x767.jpg 1024w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0644-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0644-768x575.jpg 768w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0644-400x300.jpg 400w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0644.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Source:<\/strong> <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-infographic\/\">https:\/\/cybersecurityventures.com\/cybercrime-infographic\/<\/a><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecurityventures.com\/cybercrime-infographic\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"767\" src=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0645-1024x767.jpg\" alt=\"\" class=\"wp-image-324\" srcset=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0645-1024x767.jpg 1024w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0645-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0645-768x575.jpg 768w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0645-400x300.jpg 400w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0645.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\"><strong>Source:<\/strong> <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-infographic\/\">https:\/\/cybersecurityventures.com\/cybercrime-infographic\/<\/a><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"767\" src=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0646-1024x767.jpg\" alt=\"\" class=\"wp-image-325\" srcset=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0646-1024x767.jpg 1024w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0646-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0646-768x575.jpg 768w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0646-400x300.jpg 400w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0646.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Source:<\/strong> <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-infographic\/\">https:\/\/cybersecurityventures.com\/cybercrime-infographic\/<\/a><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"767\" src=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0647-1024x767.jpg\" alt=\"\" class=\"wp-image-326\" srcset=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0647-1024x767.jpg 1024w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0647-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0647-768x575.jpg 768w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0647-400x300.jpg 400w, https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2025\/02\/IMG_0647.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Source:<\/strong> <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-infographic\/\">https:\/\/cybersecurityventures.com\/cybercrime-infographic\/<\/a><\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":30333,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/pages\/316"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/users\/30333"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/pages\/316\/revisions"}],"predecessor-version":[{"id":328,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/pages\/316\/revisions\/328"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/media?parent=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}