Search keywords: cyberharassment
Nalezeno obrázků: 3
Obrázků na stránce:
Obrázky z Adobe Stock
These descriptions can serve as a guide for creating vector illustrations that capture the essence of a courtroom sentencing hearing.
Fishing email on laptop computer, Hacking password data, Digital cyber crime, Fishing hook to document on laptop screen.
Ransomware Threat: A lock on a computer screen, representing ransomware demands. Best for educating on ransomware attacks.
Identity Theft Icon
Online Fraud  Icon Element For Design
Cyber Attack Icon Set Multiple Style Collection
anti spyware
Digital Security Icon Shield With Lock For Data Protection And Cybersecurity.Cybersecurity Lock Icon - Network Security, Encryption, and Data Protection for Online Safety
secure data access with yellow lock icon
Blue digital background. Random binary code
Set of firewall, phishing, shield, gear, lock, folder, smartphone, hacker icons.
Thief icon in Glyph Style. Simple Vector Design. Simple Vector Glyph Icon
A girl in a mask sits on a laptop and catches the user's passwords on a hook. Concept of a vector illustration on the topic of cybercrime and phishing attacks.
password glyph icon
Phishing Scam Prevention – Online Fraud and Email Security Awareness
Vector Design Phone Virus Icon Style
Computer Science Icon Set Multiple Style Collection
Protection concept. Protect mechanism, system privacy.
Phishing cybercrime. Fishing hook with fake present. scammer or fraud theft in internet, hacking cyber crime
Line vector of cyber security icons including antivirus and white hat hacker
These illustrations collectively depict a comprehensive detectives crime investigation board full of intriguing details and interconnections.
Laptop with Cyber Attack Sign. Identity Theft, Stealing Personal Information and Data. Password Security. Cyber Crime and Internet Criminal Concept. Flat Isometric Vector Illustration.
Ransomware Threat: A lock on a computer screen, representing ransomware demands. Best for educating on ransomware attacks.
Cybercrime Multi Style Icon Set
Online Fraud  Icon Element For Design
Cyber Securityse Icon Set Multiple Style Collection
anti spyware
Cool Skull Hacker Logo Character with Shopping Cart
A thief is stealing wifi with fishing rod. Masked man with fishing rod phishing in the city. Phishing attack, fishing, hacker, web security, cyber thief, electronic crime, scam. Online fraud concept.
computer hacker hacking robbery secret data
These illustrations can visually represent the role and tasks of a forensic toxicologist in a clear and engaging manner.
These descriptions create a vivid representation of a bank robbery in progress while maintaining simplicity and avoiding specific references.
These descriptions can serve as a basis for simple vector illustrations that highlight the forensic fingerprinting process.
These descriptions can be used for creating simple vector illustrations focused on the work of a crime scene investigator.
Suspect at the Table A vector of a suspect sitting nervously at the table with their hands clasped in front of them and a concerned expression on their face.
TwoWay Mirror A depiction showing a twoway mirror in the interrogation room with shadowy figures of other detectives observing the interrogation from the other side.
Preparing a Report A detective sitting at a desk filled with files and evidence notes typing up a report on a laptop reflecting on the investigation process.
These descriptions can help provide a visual representation of the work and environment of a forensic anthropologist.
Taking Photographs A detective carefully photographing the crime scene with a camera capturing details like the surrounding environment and any relevant evidence.
Simulation of Events A visualization of a timeline on a screen showing key events in the 3D model such as movements during the crime.
Stolen Items A closeup view of various items being p into a backpack by a burglar including jewelry and electronics with shadows around.
Surveillance Footage A split screen showing surveillance footage of a hacker at a workstation and a police team observing from another room planning the arrest.
These descriptions should help visualize various aspects of the scenario while keeping the illustrations simple and stylistic.
Side Street Encounter The suspect hiding momentarily behind a dumpster in a side street glancing nervously to see if the police are still in pursuit.
Suspect Detainment A SWAT officer pinning a suspect to the ground while others secure the scene and ensure the safety of hostages.
Silhouette A minimalistic silhouette illustration showing the outline of a handcuffed suspect against a vibrant sunset capturing the dramatic moment.
Public Arrest A suspect is surrounded by several police officers in a public park all wearing uniforms as they are being handcuffed.
Suburban Sweep A suburban neighborhood scene with the helicopter in the sky its spotlight searching over backyards and fences.
Surveillance Map The detective beside a large printed map with marked locations corresponding to the timestamps seen in the CCTV footage.
Police Vehicle A police car parked on the scene with its lights flashing emphasizing the urgency and seriousness of the operation.
Sealing an Evidence Envelope A gloved hand sealing an evidence envelope with a wax seal demonstrating care in preserving collected evidence.
Police Vehicles Converging Multiple police vehicles surrounding the transport van to ensure security during the transfer operation.
These illustrations can effectively convey the various processes and activities involved in DNA testing in a forensic lab.
Officer Instructions A police officer instructing the suspect on how to pose with the height chart in the background as a reference point.
Notepad and Evidence The officer with a notepad in one hand and a piece of evidence e.g. a small evidence bag in the other noting the items details.
Window with Bars A closeup of a barred window at the end of the cell block highlighting the moonlight streaming through the bars and casting patterns on the floor.
Officer Monitoring An officer inside the police van responsible for monitoring prisoners looking stern while checking a document on a clipboard.
These descriptions provide a variety of visual elements that capture the essence of a suspect lineup at a police station.
These descriptions can be used to create simple effective vector illustrations that depict the scene of an arrest.
These illustrations collectively emphasize the importance of careful and contaminationfree processes in evidence collection.
Silhouette Reflection
Training Session A beginner forensic spet receives instruction from a mentor on how to effectively dust for fingerprints.
Reflective Moment The artist taking a moment to reflect looking thoughtfully at the drawing board contemplating the witnesss account.
Surveillance Monitor A wallmounted monitor displaying the live feed of the evidence room enhancing security measures against unauthorized access.
Sketch Artist A forensic artist sketching the scene on a notepad with the sheetcovered body in view and investigators discussing in the background.
Search and Clear Two officers entering a room with weapons drawn looking for threats and ensuring the area is clear of danger.
Search Team Arrival An officer signaling to a search team to approach the area while maintaining the perimeter with vibrant police tape.
Test Results Report A scientist reviewing a written report on test results showing positive or negative indicators for various toxins.
Secret Map A closeup of a prisoner studying a homemade map of the prison layout with escape routes highlighted in red.
Toxicology Report An open folder displaying a forensic toxicology report with charts and graphs indicating substance levels alongside a laptop.
Silhouetted Figures with Briefcases Silhouetted figures exchange briefcases in a dark alley depicting potential illicit transactions that investigators are monitoring.
Roof Surveillance A drone positioned above a building roof focused on a window where suious activity is taking place inside.
Tactical Team The negotiator on the phone with a tactical team in the background dressed in uniforms preparing for action while the negotiator maintains a calm approach.
DDoS glyph icon
spyware line icon
Reinforcements Arriving A vector showing reinforcements arriving at the scenemore officers and vehicles pulling into the prison yard to assist in riot control.
Scales and Weighing Equipment A section of the evidence room with scales and measuring tools for weighing substances clearly tagged for forensic use.
hacker line icon
Tactical Formation A line of SWAT officers advancing in a tactical formation ready to breach an entrance as a cohesive unit.
malware line icon
firewall line icon
data theft line icon
RealTime Investigation A detective on a stakeout using a laptop with facial recognition software open monitoring pedestrians for known offenders.
Team Briefing The criminal explaining the heist plan to a group of accomplices with the help of a projector displaying the target layout.
password line icon
Polygraph Machine A closeup of the polygraph machine with wires running to the suspects fingertips showing the readout chart indicating fluctuations.
Quotes from Witnesses Speech bubbles with quotes from witnesses are attached highlighting their observations and contributing to the overall investigation narrative.
encryption line icon
data breach line icon
Safety Procedures Pathologists putting on face shields and masks as part of their safety protocols before starting the autopsy.
Safe Cracking A robber is depicted with tools working on cracking a combination safe surrounded by tered money and a floor map of the bank.
Testing Machine A hightech machine in a lab analyzing particles collected from evidence with a digital display showing readings.
Cybercrime icon in Glyph Dual Color Style. Simple Vector Design. Simple Vector Glyph Icon
Cybercrime icon in Glyph Dual Color Style. Simple Vector Design. Simple Vector Glyph Icon
hacker glyph icon
Scanning Process A stepbystep diagram depicting the process of placing a finger on the scanner capturing the print and sending it to a digital database.
Cybercrime icon in Glyph Style. Simple Vector Design. Simple Vector Glyph Icon
Cybercrime icon in Glyph Style. Simple Vector Design. Simple Vector Glyph Icon
encryption glyph icon
data theft glyph icon
Next page
/ 10