Search keywords: unauthorized access
Images found: 2
Images per page:
Images from Adobe Stock
A customer being prompted to change their password regularly as a measure to prevent data breaches and unauthorized access to their account.. Vector illustration
Restricted access icon, no entry for unauthorized persons.
Computer password security check, protect data from unauthorised access concept.
ISO prohibition safety signs uppercase text_no access for unauthorized persons._landscape size 1/2 a4,a3,a2,a1
Prohibition sign with hand gesture and worker with protective glasses, indicating no access for unauthorized personnel
unauthorized icon
Lock Prohibited
Biometric Lock is a digital security method using fingerprints, facial recognition, or retina scans to restrict unauthorized access.
Vibrant access denied icon emphasizing security limitation with transparent background
Not authorized Icon
Combination lock securing water supply, ensuring safety and preventing unauthorized access
This image represents an unauthorized access to data. The data has been altered.
Denied icon
Secure folder concept, Data security, Folder access, Folder lock with pin to prevent unauthorized access. Vector illustration landing page.
Broken Lock Illustration: This vector illustration of a broken lock embodies themes of security, risk, and breaches.
Data breach icons illustrate compromised security, data exposure, and unauthorized access. Outline icons set.
Unauthorized Access Warning Sign
A close-up of a padlock symbolizing security and protection against unauthorized access.
Hacker connecting to devices with keyhole icons and red lightning bolts indicating cyber security threat
mobile spywear icon sign vector
Clipboard with Personal Data A clipboard with sheets of paper filled with personal data name email location being inspected by an unseen entity illustrating unauthorized data
UNSECURED
Remove access Icon
Cybersecurity risk icons illustrating common threats: malicious software, unauthorized access, social engineering, hardware damage, human errors, insider threats, and natural disasters.
Red prohibition sign preventing filming with video cameras, simple and recognizable
unauthorized icon
Lock Prohibited
Mobile Security App is an application that protects smartphones from viruses, tracking, or unauthorized access.
Insider Threats Icon
Not authorized Icon
lock and key icon, access denied-vector icon on-white-background
Cybersecurity line icons set – outline, protection, and digital security symbols
Denied icon
outline vector icons of data breach: broken lock, warning file, unauthorized access, alert icon, stolen data, exfiltration arrow, redacted file, system hole. set of line style icons in a modern,
Line style icons of digital identity: identity transaction log, ID activity history, access attempt alert, login location tracker, user session monitor, unauthorized access warning, identity breach
An open padlock with an eye symbolizes unauthorized access and data vulnerability.
Intrusion Detection icon set multiple style collection
"Unauthorized Access Icon - Royalty-Free Vector Image on White Background"
Backdoor Multi Style Icon Set
keylogger detection icon sign vector
A bank utilizing firewalls and intrusion detection systems to prevent unauthorized access to their network and customer data.. Vector illustration
Secure email or encrypted communication, ensuring privacy or confidentiality of sensitive information, protecting against unauthorized access or data breaches, using encryption protocols or secure ser
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Red and White Top Secret Stamp with Stars for Confidential Documents and Information.
Secure access control: linear icon set for locks and security
unauthorized icon
Lock Prohibited
Cyber Attack Alert is a warning system that notifies users of suspicious activity or attempted unauthorized access.
password stealing icon sign vector
Access denied Icon
Unauthorized Access icon Vector logo set flat
unauthorized access icon Simple thin line stroke
Healthcare audit trails icons set – flat, outline, compliance and access symbols
 No entry sign, no access for pedestrians prohibition sign, no unauthorized entry. on white background. Vector illustration
Abstract geometric lock symbol representing security and protection against unauthorized access
Remove access Icon
forbidden access
Flat style illustration depicting an access denied warning page
Forbidden access lock symbol on black background illustration
Backdoor Solid Icon
Confidential Data Security An illustration of a lock with binary code emphasizing AIs role in securing sensitive data and preventing unauthorized access associated with fraud.
No climbing fence icon. Security warning vector illustration. Prohibited action sign for unauthorized access. Safety symbol for restricted areas, ensuring compliance with regulations and protection.
Shadow It Issue Icon Lineal Blue Style
Secure laptop with a lock symbol representing digital safety and protection from unauthorized access
Line style icons of cybersecurity and privacy: system breach icon, unauthorized entry badge, critical alert screen, firewall bypass layout, access leak panel, threat marker symbol, compromised system
unauthorized icon
Prohibited File
Data Breach Alert is an immediate notification triggered when sensitive or personal data is exposed to unauthorized users.
Insider Threats Icon
Access denied Icon
Warning No Unauthorized Entry
Modern key icon representing access security and protection against unauthorized entry on red background
NO ENTRY TO UNAUTHORIZED PERSONNERL SIGN VECTOR
No entry  icon, no access for pedestrians prohibition sign, no unauthorized entry. on white background. Vector illustration
website hack attack icon sign vector
Remove access Icon
User profile access abstract concept vector illustrations.
Cyber security icons: shield, lock, phishing warning, firewall, globe symbols.
Data Breach concept, Cyber attack, Hacker stealing information by breaking the password, Unauthorized access to website account.
Isometric flat vector set of icons of data breach: broken lock, warning file, unauthorized access, alert icon, stolen data, exfiltration arrow, redacted file, system hole. isolated transparent
Using encryption techniques to protect sensitive historical data from unauthorized access or tampering.. Vector illustration
Line style icons of cybersecurity and privacy: intrusion detection icon, monitoring alert badge, unauthorized access screen, IDS panel layout, suspicious activity graph, threat signal card, detection
No Unauthorized Access Icon
no exit sign
Mobile phone unauthorized access prevention, login password verification, data protection, vector isometric illustration
unauthorized icon
Dislike Lock
user no access icon sign vector
Line style icons of Web3 licensing: license revocation tool, expired rights alert, blacklisted content badge, unauthorized usage warning, contract breach flag, takedown request icon, content lockout
Not authorized Icon
Data breach icons illustrate compromised security, data exposure, and unauthorized access, transparent background. Outline icons set.
No Trespassing After Hours Sign with Symbol
Cybersecurity flat icons set. data protection and online security symbols
page denied icon sign vector
pc computer hack icon sign vector
laptop locked icon sign vector
vsrr91 VectorSignRoundRed vsrr - german: Zutritt verboten . english: prohibition sign . no unauthorized access for persons . vector graphic sign . transparent background . AI 10 / EPS 10 . g11189
Remove access Icon
Next page
/ 10