Search keywords: unauthorized
Images found: 2
Images per page:
Images from Adobe Stock
Data breach icons illustrate compromised security, data exposure, and unauthorized access. Outline icons set.
unauthorized access icon simple illustration collection symbol
A police line with “Do Not Cross” tape blocking access to an area under police investigation. Used to secure crime scenes, accidents, or violence cases to prevent unauthorized entry and ensure safety
Hacker Vector Line Icon Design
Safety caution icon signifying no admittance for workers or unauthorized entry.
Data Encryption is the process of converting information into code to prevent unauthorized access.
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access, and protected. Vector illustration web line icon collection
A bank utilizing firewalls and intrusion detection systems to prevent unauthorized access to their network and customer data.. Vector illustration
Vector art of red prohibition sign
Red grunge textured rubber stamp icon diagonally displaying the important phrase unregistered details for official documents
Email Hacked Icon
illegal Vector Line Maroon Design
Unauthorized Icon Design
Set of shield icons with a cross symbol indicating security breach or denial
Secure shield with a lock icon symbolizing safety and protection against threats and unauthorized access
Cloud data security concept showing locked financial information and a blindfolded unauthorized user
Hacker  Pink Circle  Icon Design
Keep door closed sign. Make sure door is closed after passing through it. Provide security, maintain temperature conditions, prevent the spread of smoke or fire. Prevent unauthorized access.
Bright yellow padlock with a black keyhole symbolizing security and protection against unauthorized access
cryptojacking  icon
Firewall icon on digital screen. Represents network protection, cybersecurity or unauthorized access blocking.
A smartphone screen displaying a red 'X' icon and 'Verification Rejected' message on a white background, symbolizing failure
Falsified stamp in bold red color on white background
Flat illustration of two people configuring secure cloud storage to ensure data integrity and prevent unauthorized access to online files
Security Breach Icons. Exposed Credential Elements linear set: warning login tag, altered code strip, insecure keycard, unauthorized access alert, danger symbol, tampered token,
Not authorized Icon
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Infrared sensors and motion detectors installed around the plant to alert security in case of any unauthorized movement.. Vector illustration
Red grunge rubber stamp clearly states NOT APPROVED COPY on a clean white surface
Red grungy rubber stamp effect displaying text unlicensed access in a diagonal orientation across a surface
UNAUTHORIZED COPY
No smoke, no Vape, and a Place for smoking is a set of neon signs. Bright symbol, icon, light warning sign of smoking in an unauthorized place. Stop smoking Vector illustration
house key silhouette illustration of a tool used to secure doors and prevent unauthorized access to a building or room
Set of shield icons with a cross symbol indicating rejection or error
User profile access isolated cartoon vector illustrations se
Firewall concept. Firewall defending against cyberattacks and unauthorized access enhances data security. Firewall ensures safe communication and system protection. For IT, data, and privacy
Mobile Security App is an application that protects smartphones from viruses, tracking, or unauthorized access.
Network segmentation divides a network into multiple isolated segments or subnetworks to contain and control the spread of security threats and limit unauthorized access to sensitive resources
Firewall Breach Network Intrusion Unauthorized Access Data Leak Security Vulnerability Minimal Icon Set
Unauthorized person keep out sign
Password management gradient vector icon for dark theme. Preventing unauthorized access. Encrypted digital database. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
No unauthorized entry icon . Set of human prohibition icon. Set of deny entry simple vector icon. Vector illustration. The zone is dangerous for humans. Warning sign.
Folder Hacked Icon
Flat illustration of man setting up secure wi-fi network with strong password to prevent unauthorized access
Adobe Illustrator Artwork
A bold red "Do Not Enter" sign warns against unauthorized access. Modern flat vector sticker label with icon and badge style, transparent background
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access, and protected. Vector illustration web line icon collection
Data Flow Graphic with Red Cross Illustration showing a flow of data represented by arrows with a red cross over a graphic of unauthorized access emphasizing data restrictions.
Suspicious login activity icon. User login form with warning sign on screen, shown in outline and color versions. Perfect for cybersecurity or unauthorized access alerts.
Red distressed rubber stamp marking with prominent text unlicensed accessory diagonally applied to a surface
A red grungy fake stamp on a with a distressed texture
No trespassing sign with forbidden door symbol in red circle. No trespassing indication conveys restriction against unauthorized entry into private property.
Vector art of two vintage padlocks offer a sense of security and protection against unauthorized access to valuables
Folder security icons: lock, shield, and key for data protection
Safety and security. Futuristic cyber banner with the concept of protecting your data from unauthorized hacking. Shield. Cyber security. Secure login via touch ID. Vector
Drugs prohibition icon. No pills vector illustration. Restricted sign for medication and narcotics control in public spaces. Warning symbol for safety regulations against unauthorized drug use.
Person initiating breach on dark panel, suitable for cybersecurity concepts, data breach scenarios, and network security presentations or articles.
Detection Unauthorized Access Alert Icon
Open laptop with password input box, warning sign, hand holding keys, and server in background. Ideal for cybersecurity, hacking, encryption, unauthorized access, data breach online security
Hazardous warning tape sets are essential for marking danger zones. Ideal for construction sites and crime scene safety, they ensure clear visibility and help prevent unauthorized access.
Red grunge stamp indicating emergency alert alongside a blue rubber stamp marked restricted access with a hand holding a padlock symbol
A police line with “Do Not Cross” tape blocking access to an area under police investigation. Used to secure crime scenes, accidents, or violence cases to prevent unauthorized entry and ensure safety
Prohibition Of Toy Drone Flight Sign Emphasizing No Unauthorized Aerial Devices
Unauthorized Access icon vector. restricted account access on laptop symbol. vector illustration.
Information privacy. Vector illustration. Safeguarding access to sensitive information is crucial for maintaining privacy Cyber security systems defend networks and systems from unauthorized access
do not enter sign and No pedestrians sign flat icon vector
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Confidential Data Security An illustration of a lock with binary code emphasizing AIs role in securing sensitive data and preventing unauthorized access associated with fraud.
Abstract locked computer with a virus  symbolizing the prevention of unauthorized access. simple Vector art
Official red rectangular rubber stamp with texture displaying the warning Unlicensed Item on document
Pesticide storage sign and labels all unauthorized person keep out fire may cause toxic fumes
smoking icon vector
Keep door closed sign. Make sure door is closed after passing through it. Provide security, maintain temperature conditions, prevent the spread of smoke or fire. Prevent unauthorized access.
ISO prohibition safety signs_no access for unauthorized persons_your custom message here landscape size 1/2 a4,a3,a2,a1
cryptojacking  icon
Unauthorized Icon Design
Compressor area no unauthorized entry sign.eps
Unauthorized
outline vector icons of data breach: broken lock, warning file, unauthorized access, alert icon, stolen data, exfiltration arrow, redacted file, system hole. set of line style icons in a modern,
Fraud detection concept, debit card fraud detection uses tools and techniques to identify and prevent unauthorized transactions, thereby protecting against financial loss. improve payment security.
Paper shredder. Sheet with the inscription confidential. Destroy secret documents, office equipment, device, black accounting, carry out fraudulent activities, fraud, protection, unauthorized access
Grunge black keep out word square rubber seal stamp on white background
Espionage - type of cyberattack in which an unauthorized user attempts to access sensitive or classified data or intellectual property, colorful text concept background
Flat illustration of man encrypting sensitive data to protect from unauthorized access and ensuring confidentiality
Shared file vector illustration. Cyberspace provides secure environment for exchanging and accessing shared files Access controls and encryption technologies safeguard shared files from unauthorized
Session Hijacking Vector Icon. Two user icons with arrows and a broken chain link between them, unauthorized takeover of a connection, isolated sketch for cybersecurity, network security, online threa
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access, and protected. Vector illustration web line icon collection
Infrared cameras capture the movement of every vehicle providing an extra layer of security and helping to prevent unauthorized flights.. Vector illustration
A red stamp with the word fake on it
A distressed rectangular stamp with grunge effect displaying the phrase unlicensed sale for warning purposes
Access denied screen icon in outline and color styles, vector symbol for restricted entry, failed login attempt, security block, and unauthorized access alert.
high voltage for electronic sticker danger signs labels printable poster electrical place template design
Hands using a screwdriver to tamper with a padlock on a door
People working on protection system and storing digital personal data on your device. System of protection against malicious attacks and unauthorized access to your data.  Futuristic cyber banner
blacklist  icon
Cyber crime characters discussing personal data breaches and unauthorized access during a digital security awareness event
Security operator using electronic jammer system to disable unauthorized flying drone during surveillance mission in restricted airspace
False icon
Hazardous area warning sign and labels no unauthorized personnel beyond this point
Fraud detection concept, debit card fraud detection uses tools and techniques to identify and prevent unauthorized transactions, thereby protecting against financial loss. improve payment security.
Next page
/ 10