{
    "protect.png": {
        "img_source": "https:\/\/icons8.com\/icon\/3MDFHx9dG2fQ\/protect",
        "download_url": "https:\/\/icons8.com\/icon\/3MDFHx9dG2fQ\/protect",
        "img_lic": "free to use",
        "md5": "0b504fd6d261650b7ef42074577b0948"
    },
    "sophia.jpg": {
        "img_source": "https:\/\/www.freepik.com\/free-photo\/portrait-young-woman-giving-thumbs-up_16929481.htm#fromView=search&page=1&position=19&uuid=7d8978bc-3515-4fa3-b4b3-b0fee80461e2&query=employee",
        "download_url": "https:\/\/www.freepik.com\/free-photo\/portrait-young-woman-giving-thumbs-up_16929481.htm#fromView=search&page=1&position=19&uuid=7d8978bc-3515-4fa3-b4b3-b0fee80461e2&query=employee",
        "img_lic": "free to use",
        "md5": false
    },
    "privacy.jpg": {
        "img_source": "https:\/\/www.freepik.com\/free-vector\/abstract-secure-technology-background_6071871.htm#fromView=search&page=3&position=21&uuid=04fb4909-f7c8-406f-aad0-176c09df9161&query=cyber+security+about",
        "download_url": "https:\/\/www.freepik.com\/free-vector\/abstract-secure-technology-background_6071871.htm#fromView=search&page=3&position=21&uuid=04fb4909-f7c8-406f-aad0-176c09df9161&query=cyber+security+about",
        "img_lic": "free to use",
        "md5": false
    },
    "laptop-metrics.png": {
        "img_source": "https:\/\/icons8.com\/icon\/XFqvv26UmZNX\/laptop-metrics",
        "download_url": "https:\/\/icons8.com\/icon\/XFqvv26UmZNX\/laptop-metrics",
        "img_lic": "free to use",
        "md5": "657f01afba1a5b60a2adc10eedf5c555"
    },
    "lock.png": {
        "img_source": "https:\/\/icons8.com\/icon\/47784\/lock",
        "download_url": "https:\/\/icons8.com\/icon\/47784\/lock",
        "img_lic": "free to use",
        "md5": "0b343408119ca75a20bd5148911c2c15"
    },
    "matrix-hacker.png": {
        "img_source": "https:\/\/www.freepik.com\/free-photo\/matrix-hacker-background_36686610.htm#fromView=image_search_similar&page=3&position=6&uuid=e38b98f3-2a64-4dea-8966-6e36502ade84&query=hacker+",
        "download_url": "https:\/\/www.freepik.com\/free-photo\/matrix-hacker-background_36686610.htm#fromView=image_search_similar&page=3&position=6&uuid=e38b98f3-2a64-4dea-8966-6e36502ade84&query=hacker+",
        "img_lic": "free to use",
        "md5": false
    },
    "network.png": {
        "img_source": "https:\/\/www.freepik.com\/free-vector\/cyber-security-concept_8290045.htm#fromView=search&page=1&position=29&uuid=9f565348-5146-4b63-a533-d9eb30e1012d&query=network+security+with+latop",
        "download_url": "https:\/\/www.freepik.com\/free-vector\/cyber-security-concept_8290045.htm#fromView=search&page=1&position=29&uuid=9f565348-5146-4b63-a533-d9eb30e1012d&query=network+security+with+latop",
        "img_lic": "free to use",
        "md5": false
    },
    "globe.png": {
        "img_source": "https:\/\/icons8.com\/icon\/47763\/globe",
        "download_url": "https:\/\/icons8.com\/icon\/47763\/globe",
        "img_lic": "free to use",
        "md5": "61715023f518db387f1c4514704f0b46"
    },
    "hacking-system-unsuccessfully.jpg": {
        "img_source": "https:\/\/www.freepik.com\/free-photo\/criminal-hacking-system-unsuccessfully_143489102.htm#fromView=search&page=1&position=4&uuid=d3d619ae-8428-429e-8f93-9caea55aa46a&query=cyber+security",
        "download_url": "https:\/\/www.freepik.com\/free-photo\/criminal-hacking-system-unsuccessfully_143489102.htm#fromView=search&page=1&position=4&uuid=d3d619ae-8428-429e-8f93-9caea55aa46a&query=cyber+security",
        "img_lic": "free to use",
        "md5": false
    },
    "eye-futuristic-robot.jpg": {
        "img_source": "https:\/\/www.freepik.com\/free-photo\/eye-futuristic-robot_11309679.htm#fromView=search&page=1&position=15&uuid=1977d591-3bac-4734-8625-4f6fa34ecd7d&query=cyber+security+service",
        "download_url": "https:\/\/www.freepik.com\/free-photo\/eye-futuristic-robot_11309679.htm#fromView=search&page=1&position=15&uuid=1977d591-3bac-4734-8625-4f6fa34ecd7d&query=cyber+security+service",
        "img_lic": "free to use",
        "md5": false
    },
    "cybercriminal.jpg": {
        "img_source": "https:\/\/www.freepik.com\/free-photo\/cybercriminal-arriving-underground-bunker_417840091.htm#fromView=image_search_similar&page=1&position=43&uuid=3185c69a-bd25-4157-913a-93d5d990cbc0&query=hacker",
        "download_url": "https:\/\/www.freepik.com\/free-photo\/cybercriminal-arriving-underground-bunker_417840091.htm#fromView=image_search_similar&page=1&position=43&uuid=3185c69a-bd25-4157-913a-93d5d990cbc0&query=hacker",
        "img_lic": "free to use",
        "md5": false
    },
    "cybersecurity-concept-illustration.png": {
        "img_source": "https:\/\/www.freepik.com\/free-ai-image\/cybersecurity-concept-illustration_382535139.htm#fromView=image_search_similar&page=4&position=14&uuid=4196a01c-27cf-49aa-8713-91725000731d&query=privacy+protection+",
        "download_url": "https:\/\/www.freepik.com\/free-ai-image\/cybersecurity-concept-illustration_382535139.htm#fromView=image_search_similar&page=4&position=14&uuid=4196a01c-27cf-49aa-8713-91725000731d&query=privacy+protection+",
        "img_lic": "free to use",
        "md5": false
    },
    "cybersecurity-global-data-protection.jpg": {
        "img_source": "https:\/\/www.freepik.com\/free-ai-image\/cybersecurity-global-data-protection_419063295.htm#fromView=search&page=1&position=23&uuid=60a6b787-b8d5-411d-acfe-4baa74719633&query=globe+network+cyber",
        "download_url": "https:\/\/www.freepik.com\/free-ai-image\/cybersecurity-global-data-protection_419063295.htm#fromView=search&page=1&position=23&uuid=60a6b787-b8d5-411d-acfe-4baa74719633&query=globe+network+cyber",
        "img_lic": "free to use",
        "md5": false
    },
    "dainel.jpg": {
        "img_source": "https:\/\/www.freepik.com\/free-photo\/businessman-black-suit-makes-thumb-up-sign_10835973.htm#fromView=search&page=1&position=21&uuid=7d8978bc-3515-4fa3-b4b3-b0fee80461e2&query=employee",
        "download_url": "https:\/\/www.freepik.com\/free-photo\/businessman-black-suit-makes-thumb-up-sign_10835973.htm#fromView=search&page=1&position=21&uuid=7d8978bc-3515-4fa3-b4b3-b0fee80461e2&query=employee",
        "img_lic": "free to use",
        "md5": false
    },
    "encryption.jpg": {
        "img_source": "https:\/\/www.freepik.com\/free-vector\/cyber-security-concept_7970729.htm#fromView=search&page=1&position=1&uuid=bd8de86e-1216-41ec-afbb-af9122602e1b&query=cyber+security",
        "download_url": "https:\/\/www.freepik.com\/free-vector\/cyber-security-concept_7970729.htm#fromView=search&page=1&position=1&uuid=bd8de86e-1216-41ec-afbb-af9122602e1b&query=cyber+security",
        "img_lic": "free to use",
        "md5": false
    },
    "cyber.jpg": {
        "img_source": "https:\/\/www.freepik.com\/free-vector\/gradient-connection-background_45157703.htm#fromView=search&page=1&position=45&uuid=bfb3dfdd-5a83-41b1-b729-31239ba66969&query=cyber+securtiy+background+image+blue",
        "download_url": "https:\/\/www.freepik.com\/free-vector\/gradient-connection-background_45157703.htm#fromView=search&page=1&position=45&uuid=bfb3dfdd-5a83-41b1-b729-31239ba66969&query=cyber+securtiy+background+image+blue",
        "img_lic": "free to use",
        "md5": false
    },
    "access.png": {
        "img_source": "https:\/\/icons8.com\/icon\/RxBYeXdnyQtJ\/access",
        "download_url": "https:\/\/icons8.com\/icon\/RxBYeXdnyQtJ\/access",
        "img_lic": "free to use",
        "md5": "e3e611eb500c28acad133bacb5d2d5b9"
    },
    "andrew.jpg": {
        "img_source": "https:\/\/www.freepik.com\/free-photo\/smiling-young-male-professional-standing-with-arms-crossed-while-making-eye-contact-against-isolated-background_27507898.htm#fromView=search&page=3&position=30&uuid=7d8978bc-3515-4fa3-b4b3-b0fee80461e2&query=employee",
        "download_url": "https:\/\/www.freepik.com\/free-photo\/smiling-young-male-professional-standing-with-arms-crossed-while-making-eye-contact-against-isolated-background_27507898.htm#fromView=search&page=3&position=30&uuid=7d8978bc-3515-4fa3-b4b3-b0fee80461e2&query=employee",
        "img_lic": "free to use",
        "md5": false
    },
    "businessman-holding-tablet-with-virtual-application.jpg": {
        "img_source": "https:\/\/www.freepik.com\/free-photo\/businessman-holding-tablet-with-virtual-application_953759.htm#fromView=search&page=1&position=13&uuid=4394cef4-d001-49f9-9f1d-f9e4a2ad85c0&query=+network+cyber+contact+",
        "download_url": "https:\/\/www.freepik.com\/free-photo\/businessman-holding-tablet-with-virtual-application_953759.htm#fromView=search&page=1&position=13&uuid=4394cef4-d001-49f9-9f1d-f9e4a2ad85c0&query=+network+cyber+contact+",
        "img_lic": "free to use",
        "md5": false
    }
}