Search keywords: киберпреступность
Найдено изображений: 16
Изображений на странице:
Изображения из Adobe Stock
Hacker Hand Vector - Cyber Theft Digital Illustration
Hacker Hand Vector - Cyber Theft Digital Illustration
Hacker Hand Vector - Cyber Theft Digital Illustration
Hacker Hand Vector - Cyber Theft Digital Illustration
Cloud Security System – Digital Protection for Online Data Storage
Cloud Security System – Digital Protection for Online Data Storage
Secure Online Payment – Financial Data Protection and Digital Banking Security
Secure Online Payment – Financial Data Protection and Digital Banking Security
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Biometric Security System – Digital Fingerprint Authentication Concept
Phishing Scam Prevention – Online Fraud and Email Security Awareness
Secure Online Payment – Financial Data Protection and Digital Banking Security
Secure Online Payment – Financial Data Protection and Digital Banking Security
Secure Online Payment – Financial Data Protection and Digital Banking Security
Biometric Security System – Digital Fingerprint Authentication Concept
Phishing Scam Prevention – Online Fraud and Email Security Awareness
AI-Powered Cybersecurity – Artificial Intelligence for Threat Detection
Secure Online Payment – Financial Data Protection and Digital Banking Security
Secure Online Payment – Financial Data Protection and Digital Banking Security
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
AI-Powered Cybersecurity – Artificial Intelligence for Threat Detection
Secure Online Payment – Financial Data Protection and Digital Banking Security
AI-Powered Cybersecurity – Artificial Intelligence for Threat Detection
Cloud Security System – Digital Protection for Online Data Storage
Ransomware Protection – Preventing Digital Extortion and Cyber Threats
Cloud Security System – Digital Protection for Online Data Storage
Cloud Security System – Digital Protection for Online Data Storage
AI-Powered Cybersecurity – Artificial Intelligence for Threat Detection
Phishing Scam Prevention – Online Fraud and Email Security Awareness
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Phishing Scam Prevention – Online Fraud and Email Security Awareness
Secure Online Payment – Financial Data Protection and Digital Banking Security
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Silhouetted Figures with Briefcases Silhouetted figures exchange briefcases in a dark alley depicting potential illicit transactions that investigators are monitoring.
Roof Surveillance A drone positioned above a building roof focused on a window where suious activity is taking place inside.
Reinforcements Arriving A vector showing reinforcements arriving at the scenemore officers and vehicles pulling into the prison yard to assist in riot control.
DDoS line icon
DDoS glyph icon
spyware line icon
Scales and Weighing Equipment A section of the evidence room with scales and measuring tools for weighing substances clearly tagged for forensic use.
Cybercrime icon in Flat Color Style. Simple Vector Design. Simple Vector Flat Icon
password line icon
data theft line icon
RealTime Investigation A detective on a stakeout using a laptop with facial recognition software open monitoring pedestrians for known offenders.
Polygraph Machine A closeup of the polygraph machine with wires running to the suspects fingertips showing the readout chart indicating fluctuations.
Quotes from Witnesses Speech bubbles with quotes from witnesses are attached highlighting their observations and contributing to the overall investigation narrative.
encryption line icon
Safe Cracking A robber is depicted with tools working on cracking a combination safe surrounded by tered money and a floor map of the bank.
Tactical Formation A line of SWAT officers advancing in a tactical formation ready to breach an entrance as a cohesive unit.
Cybercrime icon in Glyph Dual Color Style. Simple Vector Design. Simple Vector Glyph Icon
Safety Procedures Pathologists putting on face shields and masks as part of their safety protocols before starting the autopsy.
Cybercrime icon in Glyph Dual Color Style. Simple Vector Design. Simple Vector Glyph Icon
Scanning Process A stepbystep diagram depicting the process of placing a finger on the scanner capturing the print and sending it to a digital database.
Cybercrime icon in Glyph Style. Simple Vector Design. Simple Vector Glyph Icon
encryption glyph icon
data breach line icon
data theft glyph icon
firewall glyph icon
Identity Theft Icon
Identity Theft Icon
Supporting Documents The officer holding a folder containing case documents with an open page showing crime scene photos.
These illustrations can convey the essence of the criminal mastermind character while maintaining a simplistic and impactful style.
Simulation of Events A visualization of a timeline on a screen showing key events in the 3D model such as movements during the crime.
Stolen Items A closeup view of various items being p into a backpack by a burglar including jewelry and electronics with shadows around.
Surveillance Footage A split screen showing surveillance footage of a hacker at a workstation and a police team observing from another room planning the arrest.
Suspect Detainment A SWAT officer pinning a suspect to the ground while others secure the scene and ensure the safety of hostages.
Cybercrime icon in Outline Style. Simple Vector Design. Simple Vector Outline Icon
Cybercrime icon in Blue Color Style. Simple Vector Design. Simple Vector Flat Icon
Cybercrime icon in Mix Filled Style. Simple Vector Design. Simple Vector Outline Filled Icon
Thief icon in Outline Style. Simple Vector Design. Simple Vector Outline Icon
Cybercrime icon in Blue Color Style. Simple Vector Design. Simple Vector Flat Icon
Thief icon in Blue Color Style. Simple Vector Design. Simple Vector Flat Icon
Cybercrime icon in Blue Color Style. Simple Vector Design. Simple Vector Flat Icon
Thief icon in Mix Filled Style. Simple Vector Design. Simple Vector Outline Filled Icon
Cybercrime icon in Outline Style. Simple Vector Design. Simple Vector Outline Icon
Phishing icon in Mix Filled Style. Simple Vector Design. Simple Vector Outline Filled Icon
Phishing icon in Outline Style. Simple Vector Design. Simple Vector Outline Icon
Cybercrime icon in Mix Filled Style. Simple Vector Design. Simple Vector Outline Filled Icon
Cybercrime icon in Mix Filled Style. Simple Vector Design. Simple Vector Outline Filled Icon
Cybercrime Multi Style Icon Set
ddods gradient icon
Sketchpad with Outline A sketchpad showing a rough outline of a face with dashes indicating where facial features will be refined.
Digital Protection Cybersecurity Icon
Street View A depiction of the suspect on the street with a line connecting them to the surveillance van showing the hidden nature of the operation.
These descriptions can serve as a basis for simple vector illustrations that highlight the forensic fingerprinting process.
These descriptions cover a range of scenarios and techniques involved in a forensic fingerprint investigation on a car.
These descriptions can help provide a visual representation of the work and environment of a forensic anthropologist.
These descriptions serve as concepts for vector illustrations while portraying the activities of a counterfeit money operation.
These illustrations can visually represent the role and tasks of a forensic toxicologist in a clear and engaging manner.
Cybercrime Icon
Surveillance Map The detective beside a large printed map with marked locations corresponding to the timestamps seen in the CCTV footage.
Next page
/ 10