Search keywords: cybercrime
Найдено изображений: 11
Изображений на странице:
Изображения из Adobe Stock
Vector Design Phone Virus Icon Style
These descriptions can serve as a guide for creating vector illustrations that capture the essence of a courtroom sentencing hearing.
Concept of online fraud, cyber crime, data hacking. Scammer want to steal personal details
Cybercrime Blue Icon
Ransomware Threat: A lock on a computer screen, representing ransomware demands. Best for educating on ransomware attacks.
Online Fraud  Icon Element For Design
Email Phishing is a deceptive tactic where fake emails trick users into revealing personal data or credentials.
Fake W Icon Set Multiple Style Collection
Cybercrime icon in Glyph Style. Simple Vector Design. Simple Vector Glyph Icon
Blue digital background. Random binary code
Phishing Icon
scan malware for cybercrime color illustration
Email Phishing Attack Illustration
Phishing Scam Prevention – Online Fraud and Email Security Awareness
Illustration of hacker with laptop
Data Breach Icon Set Multiple Style Collection
Cyber Risk, Cyber insurance, Cyber insurance market, IT security, cybercrime risk data protection, information technology infrastructure and digital security concept
malware glyph icon
Identity Theft Icon
Data Breach word cloud concept
Vector Design Phone Virus Icon Style
These descriptions can serve as a basis for simple vector illustrations that highlight the forensic fingerprinting process.
crime
Cybercrime Flat Icon
Ransomware Threat: A lock on a computer screen, representing ransomware demands. Best for educating on ransomware attacks.
Online Fraud  Icon Element For Design
These descriptions can be used for creating simple vector illustrations focused on the work of a crime scene investigator.
Suspect at the Table A vector of a suspect sitting nervously at the table with their hands clasped in front of them and a concerned expression on their face.
Preparing a Report A detective sitting at a desk filled with files and evidence notes typing up a report on a laptop reflecting on the investigation process.
These descriptions can help provide a visual representation of the work and environment of a forensic anthropologist.
Simulation of Events A visualization of a timeline on a screen showing key events in the 3D model such as movements during the crime.
Stolen Items A closeup view of various items being p into a backpack by a burglar including jewelry and electronics with shadows around.
Surveillance Footage A split screen showing surveillance footage of a hacker at a workstation and a police team observing from another room planning the arrest.
Side Street Encounter The suspect hiding momentarily behind a dumpster in a side street glancing nervously to see if the police are still in pursuit.
Suspect Detainment A SWAT officer pinning a suspect to the ground while others secure the scene and ensure the safety of hostages.
Silhouette A minimalistic silhouette illustration showing the outline of a handcuffed suspect against a vibrant sunset capturing the dramatic moment.
Public Arrest A suspect is surrounded by several police officers in a public park all wearing uniforms as they are being handcuffed.
Suburban Sweep A suburban neighborhood scene with the helicopter in the sky its spotlight searching over backyards and fences.
Surveillance Map The detective beside a large printed map with marked locations corresponding to the timestamps seen in the CCTV footage.
Police Vehicle A police car parked on the scene with its lights flashing emphasizing the urgency and seriousness of the operation.
Sealing an Evidence Envelope A gloved hand sealing an evidence envelope with a wax seal demonstrating care in preserving collected evidence.
Illustration of hacker with laptop
Illustration of hacker with laptop
Illustration of hacker with laptop
Illustration of hacker with laptop
Police Vehicles Converging Multiple police vehicles surrounding the transport van to ensure security during the transfer operation.
Illustration of hacker with laptop
Officer Instructions A police officer instructing the suspect on how to pose with the height chart in the background as a reference point.
Illustration of hacker with laptop
Illustration of hacker with laptop
Illustration of hacker with laptop
Illustration of hacker with laptop
Illustration of hacker with laptop
Illustration of hacker with laptop
Illustration of hacker with laptop
Illustration of hacker with laptop
Illustration of hacker with laptop
Notepad and Evidence The officer with a notepad in one hand and a piece of evidence e.g. a small evidence bag in the other noting the items details.
Officer Monitoring An officer inside the police van responsible for monitoring prisoners looking stern while checking a document on a clipboard.
These descriptions can be used to create simple effective vector illustrations that depict the scene of an arrest.
Silhouette Reflection
Cybercrime icon in Outline Style. Simple Vector Design. Simple Vector Outline Icon
Cybercrime icon in Blue Color Style. Simple Vector Design. Simple Vector Flat Icon
Cybercrime icon in Mix Filled Style. Simple Vector Design. Simple Vector Outline Filled Icon
Cybercrime icon in Blue Color Style. Simple Vector Design. Simple Vector Flat Icon
Cybercrime icon in Blue Color Style. Simple Vector Design. Simple Vector Flat Icon
Cybercrime icon in Outline Style. Simple Vector Design. Simple Vector Outline Icon
Thief icon in Flat Color Style With Outline. Simple Vector Design. Simple Vector Flat Icon
Reflective Moment The artist taking a moment to reflect looking thoughtfully at the drawing board contemplating the witnesss account.
Cybercrime icon in Mix Filled Style. Simple Vector Design. Simple Vector Outline Filled Icon
Surveillance Monitor A wallmounted monitor displaying the live feed of the evidence room enhancing security measures against unauthorized access.
Thief icon in Flat Color Style. Simple Vector Design. Simple Vector Flat Icon
Sketch Artist A forensic artist sketching the scene on a notepad with the sheetcovered body in view and investigators discussing in the background.
Cybercrime icon in Mix Filled Style. Simple Vector Design. Simple Vector Outline Filled Icon
Search and Clear Two officers entering a room with weapons drawn looking for threats and ensuring the area is clear of danger.
Search Team Arrival An officer signaling to a search team to approach the area while maintaining the perimeter with vibrant police tape.
Test Results Report A scientist reviewing a written report on test results showing positive or negative indicators for various toxins.
Secret Map A closeup of a prisoner studying a homemade map of the prison layout with escape routes highlighted in red.
Vector Design Phone Virus Icon Style
ransomware line icon
Silhouetted Figures with Briefcases Silhouetted figures exchange briefcases in a dark alley depicting potential illicit transactions that investigators are monitoring.
Roof Surveillance A drone positioned above a building roof focused on a window where suious activity is taking place inside.
Tactical Team The negotiator on the phone with a tactical team in the background dressed in uniforms preparing for action while the negotiator maintains a calm approach.
password glyph icon
DDoS glyph icon
spyware line icon
Reinforcements Arriving A vector showing reinforcements arriving at the scenemore officers and vehicles pulling into the prison yard to assist in riot control.
Scales and Weighing Equipment A section of the evidence room with scales and measuring tools for weighing substances clearly tagged for forensic use.
hacker line icon
Tactical Formation A line of SWAT officers advancing in a tactical formation ready to breach an entrance as a cohesive unit.
Thief icon in Glyph Dual Color Style. Simple Vector Design. Simple Vector Glyph Icon
Thief icon in Glyph Style. Simple Vector Design. Simple Vector Glyph Icon
malware line icon
firewall line icon
data theft line icon
RealTime Investigation A detective on a stakeout using a laptop with facial recognition software open monitoring pedestrians for known offenders.
Team Briefing The criminal explaining the heist plan to a group of accomplices with the help of a projector displaying the target layout.
password line icon
Polygraph Machine A closeup of the polygraph machine with wires running to the suspects fingertips showing the readout chart indicating fluctuations.
Quotes from Witnesses Speech bubbles with quotes from witnesses are attached highlighting their observations and contributing to the overall investigation narrative.
Next page
/ 10