{"591816":{"#nid":"591816","#data":{"uid":"27167","author":"Rebecca Keane","created_gmt":"2017-05-16 18:37:29","changed_gmt":"2018-10-08 18:20:19","title":"Cybersecurity 2","body":[],"image":{"alt":"Computer data matrix with highlighted words data breach, cyber attack, system safety compromised, protection failed","view":{"#theme":"field","#title":"Image","#label_display":"hidden","#view_mode":"image_740","#language":"en","#field_name":"field_image","#field_type":"image","#field_translatable":false,"#entity_type":"media","#bundle":"image","#object":{},"#items":{},"#formatter":"image","#is_multiple":false,"#third_party_settings":[],"0":{"#theme":"image_formatter","#item":{},"#item_attributes":[],"#image_style":"large","#url":null,"#cache":{"tags":["config:image.style.large","file:225558"],"contexts":[],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":0},"file":{"fid":"225558","name":"CyberSecurity2websized.jpg","path":"\/sites\/default\/files\/images\/CyberSecurity2websized.jpg","fullpath":"\/var\/www\/html\/files\/public\/images\/CyberSecurity2websized.jpg","mime":"image\/jpeg","size":601918}},"groups":[{"id":"1281","name":"Ivan Allen College of Liberal Arts"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"174439","name":"cybersecurity policy"},{"id":"174440","name":"global cybersecurity policy"},{"id":"173459","name":"ransomware"}]}}}