Search keywords: cyberharassment
Images found: 3
Images per page:
Images from Adobe Stock
Ddos Icon
Password Security: A lock symbol on a digital password field, representing strong password security. Ideal for cybersecurity awareness.
money crime icon sign vector
Trojan Horse
Hacker Icon
Quotes from Witnesses Speech bubbles with quotes from witnesses are attached highlighting their observations and contributing to the overall investigation narrative.
A hacker takes out credit card details and a bag of money from a hacked smartphone. Vector illustration on the topic of cybercrime and cybersecurity.
Hacker avatar icon symbolizing anonymous cybercrime and online threats.
Computer Bug
Phishing Icon
Phishing Website Simulation: A fake website with a warning, symbolizing a phishing attack. Best for phishing prevention education.
Hacker in Action: A hacker silhouette typing on a laptop with green code, symbolizing cybercrime. Ideal for cybersecurity awareness.
Phishing Attack Illustration: A fishing hook attached to an email, showing a phishing scam attempt. Best for awareness campaigns.
Hacker in Action: A hacker silhouette typing on a laptop with green code, symbolizing cybercrime. Ideal for cybersecurity awareness.
Phishing Website Simulation: A fake website with a warning, symbolizing a phishing attack. Best for phishing prevention education.
Hacker Hand Vector - Cyber Theft Digital Illustration
Hacker Hand Vector - Cyber Theft Digital Illustration
Hacker Hand Vector - Cyber Theft Digital Illustration
Hacker Hand Vector - Cyber Theft Digital Illustration
Hacker Hand Vector - Cyber Theft Digital Illustration
Safety Procedures Pathologists putting on face shields and masks as part of their safety protocols before starting the autopsy.
Safe Cracking A robber is depicted with tools working on cracking a combination safe surrounded by tered money and a floor map of the bank.
Hacker Hand Vector - Cyber Theft Digital Illustration
Scanning Process A stepbystep diagram depicting the process of placing a finger on the scanner capturing the print and sending it to a digital database.
data theft glyph icon
These descriptions serve as concepts for vector illustrations while portraying the activities of a counterfeit money operation.
Hacker Hand Vector - Cyber Theft Digital Illustration
firewall glyph icon
Suspect Reaction The suspect has a surprised or defensive look while the witness points at them capturing the contrast of emotions in the courtroom.
Suspect at the Table A vector of a suspect sitting nervously at the table with their hands clasped in front of them and a concerned expression on their face.
Cloud Security System – Digital Protection for Online Data Storage
Cloud Security System – Digital Protection for Online Data Storage
Secure Online Payment – Financial Data Protection and Digital Banking Security
Secure Online Payment – Financial Data Protection and Digital Banking Security
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Thief icon in Outline Style. Simple Vector Design. Simple Vector Outline Icon
Cybercrime icon in Blue Color Style. Simple Vector Design. Simple Vector Flat Icon
Biometric Security System – Digital Fingerprint Authentication Concept
Biometric Security System – Digital Fingerprint Authentication Concept
Phishing Scam Prevention – Online Fraud and Email Security Awareness
Secure Online Payment – Financial Data Protection and Digital Banking Security
Secure Online Payment – Financial Data Protection and Digital Banking Security
Secure Online Payment – Financial Data Protection and Digital Banking Security
Biometric Security System – Digital Fingerprint Authentication Concept
Phishing Scam Prevention – Online Fraud and Email Security Awareness
AI-Powered Cybersecurity – Artificial Intelligence for Threat Detection
Secure Online Payment – Financial Data Protection and Digital Banking Security
Secure Online Payment – Financial Data Protection and Digital Banking Security
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Cybercrime Scene An investigator in a modern office setting examining evidence such as a laptop smartphone and USB drives laid out on a desk.
Cybercrime icon in Outline Style. Simple Vector Design. Simple Vector Outline Icon
Thief icon in Mix Filled Style. Simple Vector Design. Simple Vector Outline Filled Icon
AI-Powered Cybersecurity – Artificial Intelligence for Threat Detection
Secure Online Payment – Financial Data Protection and Digital Banking Security
Cloud Security System – Digital Protection for Online Data Storage
Phishing icon in Mix Filled Style. Simple Vector Design. Simple Vector Outline Filled Icon
Ransomware Protection – Preventing Digital Extortion and Cyber Threats
Cloud Security System – Digital Protection for Online Data Storage
Cloud Security System – Digital Protection for Online Data Storage
AI-Powered Cybersecurity – Artificial Intelligence for Threat Detection
AI-Powered Cybersecurity – Artificial Intelligence for Threat Detection
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Phishing icon in Outline Style. Simple Vector Design. Simple Vector Outline Icon
Phishing Scam Prevention – Online Fraud and Email Security Awareness
Secure Online Payment – Financial Data Protection and Digital Banking Security
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Cybercrime icon in Mix Filled Style. Simple Vector Design. Simple Vector Outline Filled Icon
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Cybercrime icon in Mix Filled Style. Simple Vector Design. Simple Vector Outline Filled Icon
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Hacker Attack Prevention – Digital Cyber Threat Detection Concept
Tactical Formation A line of SWAT officers advancing in a tactical formation ready to breach an entrance as a cohesive unit.
Supporting Documents The officer holding a folder containing case documents with an open page showing crime scene photos.
These illustrations can convey the essence of the criminal mastermind character while maintaining a simplistic and impactful style.
Simulation of Events A visualization of a timeline on a screen showing key events in the 3D model such as movements during the crime.
Stolen Items A closeup view of various items being p into a backpack by a burglar including jewelry and electronics with shadows around.
Surveillance Footage A split screen showing surveillance footage of a hacker at a workstation and a police team observing from another room planning the arrest.
Suspect Detainment A SWAT officer pinning a suspect to the ground while others secure the scene and ensure the safety of hostages.
Sketchpad with Outline A sketchpad showing a rough outline of a face with dashes indicating where facial features will be refined.
These descriptions can be used to create simple effective vector illustrations that depict the scene of an arrest.
Street View A depiction of the suspect on the street with a line connecting them to the surveillance van showing the hidden nature of the operation.
These descriptions can serve as a basis for simple vector illustrations that highlight the forensic fingerprinting process.
These descriptions cover a range of scenarios and techniques involved in a forensic fingerprint investigation on a car.
These illustrations can visually represent the role and tasks of a forensic toxicologist in a clear and engaging manner.
Surveillance Map The detective beside a large printed map with marked locations corresponding to the timestamps seen in the CCTV footage.
These descriptions should help visualize various aspects of the scenario while keeping the illustrations simple and stylistic.
Phone representing cyber bullying and harassment through social media platforms.
Cybercrime
Cybercrime
Vector Design Phone Virus Icon Style
Web Flat Icon
Toxicology Report An illustration showing the pathologist looking at a printed toxicology report with important figures highlighted in bright colors.
Vector Design Phone Virus Icon Style
Phishing Icon
Next page
/ 10