Search keywords: киберпреступность
Найдено изображений: 16
Изображений на странице:
Изображения из Adobe Stock
Illustration of hacker with laptop
Illustration of hacker with laptop
Illustration of hacker with laptop
Illustration of hacker with laptop
Weapons Cart An illustration of a wheeled cart filled with various weapons for transport within the evidence room including handguns and side accessories.
Sketching the Scene An illustration of the investigator sketching the layout of the crime scene on a large pad capturing the positioning of various pieces of evidence.
These descriptions can guide an illustrator in creating simple and effective vector illustrations.
Tools of the Trade The detective surrounded by forensic toolsgloves a camera and evidence bagswhile studying the spatter patterns with intense focus.
These descriptions provide a concise conceptualization of activities and essential elements within a coroners office setting.
These descriptions serve as concepts for vector illustrations while portraying the activities of a counterfeit money operation.
Sketch to Model Transition An illustration showing a sketch of a crime scene on one side and the corresponding detailed 3D model on the other connected by arrows.
These descriptions can serve as a guide for creating vector illustrations that capture the essence of a courtroom sentencing hearing.
These illustrations collectively depict a comprehensive detectives crime investigation board full of intriguing details and interconnections.
These illustrations can visually represent the role and tasks of a forensic toxicologist in a clear and engaging manner.
These descriptions can serve as a basis for simple vector illustrations that highlight the forensic fingerprinting process.
These descriptions can be used for creating simple vector illustrations focused on the work of a crime scene investigator.
These descriptions can help provide a visual representation of the work and environment of a forensic anthropologist.
Taking Photographs A detective carefully photographing the crime scene with a camera capturing details like the surrounding environment and any relevant evidence.
Simulation of Events A visualization of a timeline on a screen showing key events in the 3D model such as movements during the crime.
Surveillance Footage A split screen showing surveillance footage of a hacker at a workstation and a police team observing from another room planning the arrest.
These descriptions should help visualize various aspects of the scenario while keeping the illustrations simple and stylistic.
Suspect Detainment A SWAT officer pinning a suspect to the ground while others secure the scene and ensure the safety of hostages.
Cybersecurity Shield – Digital Protection and Secure Data Network set bundle
PRISONER ESCORT at the Van An officer guiding a prisoner towards the police van with the van parked at a detention center entrance.
Safe With Tools A closeup of a heavy safe with an open door surrounded by various burglary tools like a crowbar screwdriver and a drill.
Searching for Documents An illustration of an officer sifting through papers on a desk finding a suious document.
Supportive Attorney A victim sitting at the witness stand with their attorney by their side providing a reassuring presence during their emotional testimony.
Suburban Sweep A suburban neighborhood scene with the helicopter in the sky its spotlight searching over backyards and fences.
Surveillance Map The detective beside a large printed map with marked locations corresponding to the timestamps seen in the CCTV footage.
Surveillance Camera View An illustration depicting a view from a surveillance camera showing a guard monitoring inmates walking in a prison corridor.
Cybersecurity Shield – Digital Protection and Secure Data Network set bundle
Professionalism An officer with a communication device in their ear showing focus and authority while placing a suspect in handcuffs.
Hacker
Rootkit
Hacker Activity
Hacker
Rootkit
Hacker
Rootkit
Hacker
Hacker
Hacker
Rootkit
Hacker
Hacker
Rootkit
Hacker
Witness Stand A simple depiction of an empty witness stand indicating the potential for witnesses to speak but no one is currently there.
Rootkit
Hacker Activity
Rootkit
USB Drive Theft An illustration of a USB drive being stealthily plugged into a computer representing data theft in action.
Hacker
Vehicle Extraction SWAT officers securing a hostages vehicle while looking out for threats in a chaotic environment during an extraction.
Hacker Activity
Hacker Activity
Hacker
Hacker Activity
Using a Magnifying Glass A forensic expert examines the dusted fingerprint with a magnifying glass to inspect its details.
Cracking
Whiteboard Brainstorming The officer standing before a whiteboard covered in sketches of the crime scene writing down observations in a notebook.
Hacker Activity
Weapons Loading An officer loading ammunition into a service rifle with additional weapons and equipment laid out on a nearby table.
Undercover Operation An illustration of a plainclothes detective disguised as a hacker blending in at a coffee shop while monitoring the suspect.
Hacker Activity
Hacker Activity
These descriptions provide a variety of visual elements that capture the essence of a suspect lineup at a police station.
These descriptions can be used to create simple effective vector illustrations that depict the scene of an arrest.
These illustrations collectively emphasize the importance of careful and contaminationfree processes in evidence collection.
Underpass Scene A police car entering a dark underpass with graffiti on the walls and shadows enhancing the sense of speed and excitement.
Weapon Cleaning Supplies A table filled with cleaning supplies and tools for maintaining confied firearms showcasing responsible evidence management practices.
Witness Expression A closeup of the witnesss face portraying concentration and determination as they carefully assess the suspects.
Weapons Ready Three officers standing in formation outside the entrance weapons raised and ready with a loud breach command echoed in the air.
Vector Design Phone Virus Icon Style
Watchful Eyes A pair of binoculars focused on the getaway car from a nearby rooftop showcasing the tension of the chase.
Training Session A beginner forensic spet receives instruction from a mentor on how to effectively dust for fingerprints.
TwoWay Mirror Focus A closeup view of the twoway mirror reflecting the silhouettes of investigators while revealing an empty interrogation space.
Wildflowers or Personal Items A table beside the victim holds personal items or mementos like wildflowers representing their story and struggles as they read.
Bomb Icon
Surveillance Monitor A wallmounted monitor displaying the live feed of the evidence room enhancing security measures against unauthorized access.
Hacker Icon
Sketch Artist A forensic artist sketching the scene on a notepad with the sheetcovered body in view and investigators discussing in the background.
Test Results Report A scientist reviewing a written report on test results showing positive or negative indicators for various toxins.
Bomb Icon
Threat Multistyle Icon Set
Toxicology Report An open folder displaying a forensic toxicology report with charts and graphs indicating substance levels alongside a laptop.
Cyber Attack vector icon
Tactical Team The negotiator on the phone with a tactical team in the background dressed in uniforms preparing for action while the negotiator maintains a calm approach.
Signing Documents The bail bondsman handing a pen to the defendant as they prepare to sign the bail agreement.
Report Writing A straightforward illustration of a coroner typing a report on a laptop with charts and graphs displayed on the screen.
Tactical Formation A line of SWAT officers advancing in a tactical formation ready to breach an entrance as a cohesive unit.
Tactical Position A police officer crouched slightly as they handcuff a suspect on the ground in an alley with graffiti in the background.
Team Briefing The criminal explaining the heist plan to a group of accomplices with the help of a projector displaying the target layout.
Privacy Curtain Icon for Cybersecurity Data Privacy Encryption and Protection
Firewall Icon for Cybersecurity Data Privacy Encryption and Security Vector Design
Firewall Icon for Cybersecurity Data Privacy Encryption and Security Vector Illustration
Testing Machine A hightech machine in a lab analyzing particles collected from evidence with a digital display showing readings.
hacker Solid icon
Ransomware Threat: A lock on a computer screen, representing ransomware demands. Best for educating on ransomware attacks.
Ransomware Threat: A lock on a computer screen, representing ransomware demands. Best for educating on ransomware attacks.
Next page
/ 10