Search keywords: unauthorized
Images found: 2
Images per page:
Images from Adobe Stock
Denied Icon
Security Breach Icon Flat Style Vector Illustration
Illustrating comprehensive cloud security, this icon symbolizes advanced data protection, secure online storage, and digital privacy, ensuring confidential information remains safe from unauthorized a
Cyber attacks yellow word concept. Unauthorized access, malware software. Social engineering. Typography banner. Vector illustration with title text, editable icons color. Hubot Sans font used
No entry for unauthorized persons prohibition sign icon
No pulling lever icon. Restriction vector illustration for preventing unauthorized activation. Prohibited sign emergency stop misuse. Safety and security warning symbol for restricted control access.
Locked file and folder icons, data security concepts set Vector
Password protection login screen on white. Password protection secures your data and prevents unauthorized access.
no parking zone clear icon for website app or signage design prevent unauthorized vehicle parking
Cybersecurity firewall blocking unauthorized access connection vector line art on white background
Security icon isolated on white background the icon shows a shield and a padlock, representing protection and safety from threats and unauthorized access
Data Encryption is a method of converting information into unreadable code to prevent unauthorized access or theft.
Prohibited Umbrella Sign Symbolizing Restrictions and Warning against Unauthorized Items
Mobile banking fraud alert icon signals potential scams and unauthorized charges on smartphones and credit cards. Mobile banking fraud, cybersecurity awareness in digital finance vector illustration
Online graphic concept of restricted access blocked on device, unauthorized internet web access prohibited or blocked, digital security sign prohibited denied, cyber danger warning.
Distressed red rubber stamp with the word UNAUTHORIZED RECORD for official documents and digital warnings
Security measures for protecting fingerprint data and preventing unauthorized access
Orange danger do not enter sign with white exclamation point warns of hazard, providing safety information and preventing unauthorized access to restricted areas
A dense crowd of matte black silhouettes, with a striking red figure in sharp contrast under a spotlight, emphasizing the peril of insider threats in data environments
Authorized personnel only sign no unauthorized persons
Laptop displaying lock, key, and warning signs beside server stacks and a cloud. Hand icon highlights unauthorized access. Ideal for cybersecurity, data protection, hacking, software, password
Security Breach Icons. Fresh Line Design Built For Creative Flexibility In Light And Dark Versions.
A padlock icon symbolizes security and protection against unauthorized access.
Flat illustration of two people configuring secure cloud storage to ensure data integrity and prevent unauthorized access to online files
Copyright icon set. copyright symbols
Security breach icons showing broken cards and fleeing silhouette concept
Security Lock: A simple, black padlock signifies security, privacy, and protection against unauthorized access.
Password protection shown in simple black and white linear drawing. Secure access with password protection prevents unauthorized entry.
Data security concept with a server and a padlock, protecting data from unauthorized access and cyber threats data encryption and privacy
Red Ink Confidential Stamp on White Background Indicating Document Security and Restriction Access
An open padlock icon presents secure access and protection against unauthorized access for safety and reliability
Cloud security illustration shows metal padlock and chain guarding digital cloud. Cloud security includes a secure lock and chain protecting data and preventing unauthorized access.
Radar-guided anti-drone defense controlled by engineers using directional signal jammer to stop unauthorized UAVs in restricted or high-security airspace.
A clear, red circle with a diagonal line through it encloses a black hand symbol, signifying prohibition, below which the word "UNAUTHORIZED" is printed in bold, black, sans-serif capital letters on
Ambulance and emergency vehicles only unauthorized vehicles will be towed away sign isolated on a white background
Textured red rubber stamp displays UNAUTHORIZED SYSTEM indicating restricted access or a security breach warning
Prohibition Of Drone Usage Symbol In A Clear And Concise Cartoon Illustration
Keep out sign indicating restricted access, highlighting safety precautions and warning against unauthorized entry to hazardous or private property with bold text and hazard stripes
Red censored banner diagonally across a grid of black squares with white outlines and some color
A police line with “Do Not Cross” tape blocking access to an area under police investigation. Used to secure crime scenes, accidents, or violence cases to prevent unauthorized entry and ensure safety
A prison using a combination of facial recognition and voice recognition to monitor inmates movements and prevent unauthorized access to restricted areas.. Vector illustration
Broken Password Vector Glyph Icon Design
Do not copy stamp red stencil text
Cybersecurity threat alerts protect data, prevent unauthorized access, warn of breaches, defend systems, and identify risks—Latch
Copyright icon set vector in two styles isolated on white background . Copyright button
Line style icons of cybersecurity and privacy: system breach icon, unauthorized entry badge, critical alert screen, firewall bypass layout, access leak panel, threat marker symbol, compromised system
Unauthorized Access icon vector. restricted account access on laptop symbol. vector illustration.
Cloud security on digital network with closed padlock. Cloud security provides robust data protection and prevents unauthorized access, ensuring privacy.
Line style icons of digital identity: identity transaction log, ID activity history, access attempt alert, login location tracker, user session monitor, unauthorized access warning, identity breach
Eye observing binary code data beside a firewall with flame symbolizing cybersecurity, data protection, coding, privacy, network safety, unauthorized access prevention, and simple flat metaphor
No smoking no vaping and smoking area sign set. Forbidden sign icon isolated on white background vector illustration. Cigarette, vape in prohibition circle and green allowed area. Vector 10 eps.
Ensuring robust camera security and photography protection, this icon symbolizes safeguarding digital images, privacy, and valuable visual content from threats or unauthorized access
A simple black silhouette of a classic padlock with a keyhole symbolizing security privacy and protection against unauthorized access
Automatically sever connections when suspicious activity or unauthorized access is detected
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Prominent red grunge effect rubber stamp vector with the words LEGAL VIOLATION inside a rectangular border, indicating a breach of law or rules
Prohibition of Aquatic Leisure: No Swimming Sign Depicting Restricted Water Activities
unauthorized access icon vector thin outline style sign
No unauthorized access symbol with padlock and prohibition sign
Online Account Fraud Icons. Line style icons of online account fraud: unauthorized login, fake user registration, password reset
A network cable severed in two with sparks symbolizing the risks of unauthorized access and the need for physical security.
Red rubber stamp clearly displays the word UNAUTHORIZED in uppercase letters on a clean white surface
Password protection is essential, safeguarding sensitive information with secure authentication. Securing password protection methods prevents unauthorized access.
Black parachute symbol with no unauthorized text no unauthorized parachute sign prohibition
No key access icon. Forbidden entry symbol. Restricted area, private property concept. No solution or access denied. Locked, confidential, unauthorized sign vector illustration.
Unique hand-drawn private property no trespassing sign, sketch illustration
Two license plates are shown with security locks, one with a red 'X' indicating a security breach and the other with a green checkmark indicating security.
Password protection interface with lock icon and login button on light blue backdrop for security. This password protection provides access control and safeguards against unauthorized entry.
An open door with a padlock hanging from its handle, enclosed in a circle with two colored dots, conceptualizing security, access, and privacy.
Cybersecurity shield emblem presenting a digital firewall and a burning flame symbol for ultimate security and protection needs
Robust server protection icon with chain and padlock, symbolizing strong cybersecurity, data security, and network safety against unauthorized access and online threats
 A comprehensive set of outline icons focused on data protection, cyber security, privacy, and compliance topics.
Yellow and black color with line striped label banner with word no unauthorized accesss
vector illustration red worn texture rubber stamp visa approved text
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Grungy red rubber stamp with the critical message login denied for restricted user authentication security
Endpoint Security Strategy establishes comprehensive measures to protect all devices within a network, preventing malware, unauthorized access, and data breaches
Eye icon with a diagonal line indicating no visibility or privacy
Flat illustration of two people configuring firewall settings network security and blocking unauthorized access
Biometric Fraud Icons. Line style icons of biometric fraud detection: fake fingerprint alert, photo spoof detection, deepfake face
A mosaic of numerical codes and symbols intertwined and constantly shifting concealing important data from unauthorized access.. Vector illustration
A black and yellow padlock icon representing security, privacy, and protection against unauthorized access
Securing documents with cloud shield provides data privacy and protection. Cloud shield ensures protection of personal information and privacy from unauthorized access or cyber threats.
Digital security icons illustrating privacy, protection, and unauthorized access in modern technology
Flat illustration of two people configuring firewall settings network security and blocking unauthorized access
DNA security and genetic data privacy concept. Gene information protection from unauthorized access, hacker, and theft. Bioinformatics and cybersecurity vector icon set.
Access Denied Vector Filled Icon Design
Security shield with padlock inside protection from unauthorized access safety guarantee
Isometric workflow of anti-drone operation from radar detection to electromagnetic disruption of an unauthorized aerial vehicle.
Private terrain sign paving. Prohibited access for unauthorized persons. Private house. Stones pattern. sidewalk tiles. Paving blocks. Pavement stones. Do not enter or no entry sign.
Email Hacked Icon
Conceptual vector graphic of a secure padlock icon, illustrating digital safety and privacy protection, a strong barrier against unauthorized access
Security Alert Icons. Solid style icons of security alerts and monitoring: warning triangle, unauthorized access icon, firewall
Endpoint security concept depicting network systems protected from data breaches, unauthorized access, generative AI threats.
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Red grunge rubber stamp illustration indicating that user access has been explicitly denied for security purposes
Segregate client devices or networks to prevent unauthorized access and minimize the spread of potential threats
Writing prohibition notice forbidding unauthorized graffiti and markings
illegal Vector Glyph Icon Design
Connectivity & Nocturnal Icons. Outline icon set of connectivity security: firewall shield, VPN lock, encryption key, unauthorized
Next page
/ 10