Search keywords: unauthorized
Images found: 2
Images per page:
Images from Adobe Stock
Yellow and black security tapes, safety barrier background, caution sign, unauthorized zone, prohibited area, hazard warning notice, danger alert, copy space for text
Two programmers are working on their laptops, securing files and folders with data encryption and implementing security measures to prevent unauthorized access
A customer being prompted to change their password regularly as a measure to prevent data breaches and unauthorized access to their account.. Vector illustration
Security icons: privacy locks, shield, and restricted access symbols
Data Protected Icons. Black and White Vector Illustration. Padlock and Database. Information Safely Stored, Safe from Unauthorized Access, Loss, or Disclosure. Password and Data Security Concept
Flat illustration of man setting up secure wi-fi network with strong password to prevent unauthorized access
A simple black silhouette of a padlock with a white keyhole representing security and protection against unauthorized access
stealing data
Black parachute symbol with no unauthorized text no unauthorized parachute sign prohibition
Computer monitor with hand reaching through, for hacking, cyber intrusion, or unauthorized system access. Symbolizes digital threats and security breach.
Closed parking barrier gate restricting access to unauthorized vehicles
Identity Fraud Icons. Line style icons of identity fraud: stolen ID card, biometric spoof, fake profile, social security misuse;
Unauthorized Access icon vector. restricted account access on laptop symbol. vector illustration.
Red Confidential Rubber Stamp Seal, Indicating Secret, Private, and Restricted Information
Endpoint security concept depicting network systems protected from data breaches, unauthorized access, generative AI threats.
Anti-drone defense system operated by engineers with radar tracking and signal jamming to stop unauthorized UAVs in secure no-fly zones.
Cybersecurity precautions against unauthorized data access with keys, lock icons, cloud storage, and a hacker. Ideal for cyber threats, data protection, online security, IT infrastructure, hacking
unauthorized access icon flat thin outline art logo
Copyright icon vector. copyright sign and symbol
Fraud Detection is a security process identifying unauthorized or suspicious activities to prevent financial losses.
Flat vector icons of safety signage: hard hat required, no unauthorized entry, fire extinguisher sign, warning triangle, electric hazard icon, scaffolding caution, danger tape, exit sign.
Unauthorized Access Prohibited Sign Icon - No Trespassing Symbol
No entry sign symbolizing restricted access and boundaries, clearly indicating a prohibition of entry to unauthorized individuals
Modern security technology icons set with surveillance and protection tools
Data Protected Icons. Black and White Vector Illustration. Padlock and Database. Information Safely Stored, Safe from Unauthorized Access, Loss, or Disclosure. Password and Data Security Concept
A bold red "Do Not Enter" sign warns against unauthorized access. Modern flat vector sticker label with icon and badge style, transparent background
No entry for unauthorized persons prohibition sign icon
Distressed red rectangular rubber stamp indicating an important COVERAGE EXCLUDED status diagonally across the frame
Copyright icon logo design. copyright sign and symbol
Not authorized Icon
Silhouette icons of email spam and security: filter, biohazard, shield, lock
Hooded Hacker Stealing Data from Smartphone with Malware Attack.
Security Icon Grid. Outline icon set of security triggers: intrusion detection, firewall alert, login attempt, suspicious activity
Black padlock icon with three asterisks representing a password
Data Protected Icons. Black and White Vector Illustration. Padlock and Database. Information Safely Stored, Safe from Unauthorized Access, Loss, or Disclosure. Password and Data Security Concept
Illustration of DNA security concepts showcasing privacy, protection, and unauthorized access
No Smoking and Vaping Allowed Signs. Cigarette and E-Cig Prohibition Symbols. Smoking Area Vector 10 eps.
A simple graphic of a black padlock with a bright blue shackle symbolizing security and protection against unauthorized access
A fingerprint graphic is bisected by a red no symbol with a stylized pixelation effect on the left
Security Icons Grid. Outline icon set of security warnings: lock, shield alert, breach detected, unauthorized access, firewall,
Rejected Signature Icons. Line style icons of rejected signatures: crossed signature, invalid signature icon, pen error mark,
Ransomware data protection with secure file encryption, password shield and alert system for preventing cyber attacks. Ransomware data protection and stop unauthorized access flat vector illustration
Step-by-step isometric illustration of an anti-drone defense system detecting, tracking, and disabling unauthorized UAVs using radar and electromagnetic jammer.
Access denied screen icon in outline and color styles, vector symbol for restricted entry, failed login attempt, security block, and unauthorized access alert.
Fingerprint authentication icon set with biometric thumbprint scan, approved green check, rejected red cross, identity security verification symbol for mobile app UI web vector
Hacker  Black Circle  Icon Design
Unauthorized Access icon outline simple illustration isolated
Distressed style rubber stamp vector illustration indicating Critical Access Denied for security or restriction warnings
A powerful illustration of a blazing firewall, symbolizing a strong barrier against digital threats and unauthorized access. Perfect for cybersecurity, network security, and data protection concepts,
Not authorized Icon
Red prohibition symbol with a diagonal line across a circle isolated on transparent background
A close-up of a padlock symbolizing security and protection against unauthorized access.
A simple black silhouette of a classic padlock with a keyhole representing security privacy and protection against unauthorized access
flat black solid icon items isolated on white background network firewall (uses): malware unauthorized access content filter port control app security traffic limit
Data Protected Icons. Black and White Vector Illustration. Padlock and Database. Information Safely Stored, Safe from Unauthorized Access, Loss, or Disclosure. Password and Data Security Concept
Dark web icon vector for hidden networks, illegal activity, and online anonymity. Ideal for illustrating cybercrime, security threats, and unauthorized data access.
No smoking no vaping and smoking area sign set. Forbidden sign icon isolated on white background vector illustration. Cigarette, vape in prohibition circle and green allowed area. Vector illustration.
Intrusion detection flat outline concept icon. Physical security system. Identify unauthorized entry attempts. Modern line illustration with green glyphs. Conceptual visual. Easy to edit
Stop, Danger deep excavation, fall protection required, No unauthorized personnel beyond this point
Vector art of entry restricted sign indicating do not enter for unauthorized personnel only isolated on white background
A police line with “Do Not Cross” tape blocking access to an area under police investigation. Used to secure crime scenes, accidents, or violence cases to prevent unauthorized entry and ensure safety
Flat illustration of two people configuring secure cloud storage to ensure data integrity and prevent unauthorized access to online files
API Error Icons. Line style icons of error handling in APIs: 400 bad request, 401 unauthorized, 403 forbidden, 404 not found, 500
Blocked icon collection set. Editable stroke.
Hacker in a dark hoodie stealing confidential data from a laptop computer folder. Cyber attack, internet crime, phishing, and online fraud concept. Torn paper sticker vector.
Hacker  Brown Circle  Icon Design
A vibrant 3D rendered folder icon with a gradient of pink to orange, featuring a prominent blue padlock symbolizing data security and privacy.
Locked purple door with unlock label next to blue cloud. Represents data security, access control, and digital privacy. Ideal for cybersecurity, cloud services, privacy, technology, IT encryption
Isometric workflow of anti-drone operation from radar detection to electromagnetic disruption of an unauthorized aerial vehicle.
Not authorized Icon
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access, and protected. Vector illustration web line icon collection
A solid black padlock icon symbolizing security and protection against unauthorized access
Safety caution icon signifying no admittance for workers or unauthorized entry.
An illustration depicting icons representing approval and rejection. The imagery includes checkmarks, a cross, and hands interacting with a smartphone to show acceptance and denial.
Access denied sign displays error message. Access denied inscription in bold letters alerts users to restricted entry, unauthorized action, or system protection.
Securely delete sensitive files protecting your information from unauthorized access
No entry sign with a businessman silhouette. A conceptual icon symbolizing restricted access, unauthorized personnel, or employee prohibition.
Cybercrime concept vector with hacker stealing passwords via phishing attack. Data breach, malware, internet security threat, identity theft, and computer fraud illustration.
outline vector icons of data breach: broken lock, warning file, unauthorized access, alert icon, stolen data, exfiltration arrow, redacted file, system hole. set of line style icons in a modern,
Line style icons of Web3 licensing: license revocation tool, expired rights alert, blacklisted content badge, unauthorized usage warning, contract breach flag, takedown request icon, content lockout
Secure communication methods protecting digital messages from unauthorized access and malicious threats ensuring data privacy
A dense crowd of matte black silhouettes, with a striking red figure in sharp contrast under a spotlight, emphasizing the peril of insider threats in data environments
Security Icons Grid. Outline icon set of security warnings: lock, shield alert, breach detected, unauthorized access, firewall,
house key silhouette illustration of a tool used to secure doors and prevent unauthorized access to a building or room
Access Denied Concept isometric set. Crossed key, locked file, restricted folder, no entry icon, forbidden sign, access blocked, padlock with cross.
Secure online authentication methods safeguarding personal data against unauthorized access and cyber threats
unauthorized access icon Simple thin line stroke
Padestrian allowed and not allowed vector illustration. Pedestrian movement sign design. Outlined pedestrian symbol. Man walking in simple form. Walking symbol with black fill. Vector illustration
Engineers operating anti drone defense system with radar detection and directional signal jammer to disable unauthorized UAV in restricted airspace
Crossing at unauthorized places.Woman running on crosswalk while distracted by phone, car waiting
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access, and protected. Vector illustration web line icon collection
Abstract geometric lock symbol representing security and protection against unauthorized access
Firewall icon vector, representing network security and data protection. Ideal for cybersecurity, IT infrastructure, or privacy designs showcasing defense against threats and unauthorized access.
Ambulance and emergency vehicles only unauthorized vehicles will be towed away sign isolated on a white background
unauthorized access grunge stamp design, vector, isolated on transparent background
Flat vector icon pack of internet-related hazards: DDOS attack, malware injection, phishing, unauthorized access, and data breach
A flat icon of a businessman crossed out by a red prohibition symbol, representing being fired, laid off, or unauthorized personnel.
A police line with “Do Not Cross” tape blocking access to an area under police investigation. Used to secure crime scenes, accidents, or violence cases to prevent unauthorized entry and ensure safety
Industrial and environmental regulation vector icon set. Vector Illustrations. EPS Editable
Data Breach Icon Set Multiple Style Collection
Next page
/ 10