{"id":313,"date":"2025-09-11T03:16:45","date_gmt":"2025-09-11T03:16:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/?p=313"},"modified":"2025-09-11T03:16:45","modified_gmt":"2025-09-11T03:16:45","slug":"thoughts-about-cybersecurity-photo-style","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/2025\/09\/11\/thoughts-about-cybersecurity-photo-style\/","title":{"rendered":"Thoughts about Cybersecurity (Photo style)"},"content":{"rendered":"\n<p><em>200+ Free Cyber Security &amp; Cyber Images &#8211; Pixabay<\/em>. (2019). Pixabay.com. https:\/\/pixabay.com\/images\/search\/cyber%20security\/<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"408\" src=\"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image.jpeg\" alt=\"\" class=\"wp-image-314\" style=\"width:295px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image.jpeg 612w, https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-300x200.jpeg 300w, https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-450x300.jpeg 450w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"285\" src=\"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-2.jpeg\" alt=\"Free Crime Internet illustration and picture\" class=\"wp-image-316\" style=\"width:293px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-2.jpeg 640w, https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-2-300x134.jpeg 300w, https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-2-600x267.jpeg 600w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"358\" src=\"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-1.jpeg\" alt=\"\" class=\"wp-image-315\" style=\"width:292px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-1.jpeg 612w, https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-1-300x175.jpeg 300w, https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-1-513x300.jpeg 513w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"640\" src=\"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-4.jpeg\" alt=\"Free Ai Generated Cyber Warfare illustration and picture\" class=\"wp-image-318\" style=\"width:202px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-4.jpeg 640w, https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-4-300x300.jpeg 300w, https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-4-150x150.jpeg 150w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-3.jpeg\" alt=\"Free Coding Computer photo and picture\" class=\"wp-image-317\" style=\"width:280px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-3.jpeg 640w, https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-3-300x200.jpeg 300w, https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-content\/uploads\/sites\/38548\/2025\/09\/image-3-450x300.jpeg 450w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>200+ Free Cyber Security &amp; Cyber Images &#8211; Pixabay. (2019). Pixabay.com. https:\/\/pixabay.com\/images\/search\/cyber%20security\/<\/p>\n","protected":false},"author":30563,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/posts\/313"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/users\/30563"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/comments?post=313"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/posts\/313\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/posts\/313\/revisions\/319"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/media?parent=313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/categories?post=313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/tags?post=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}