Search keywords: unauthorized access
Images found: 2
Images per page:
Images from Adobe Stock
Prohibited File
Intrusion Icon
Image icon for unauthorized access to the cloud.
Access denied notification
Unauthorized Access icon Flat art illustration in outline
Backdoor Multi Style Icon Set
This image represents an unauthorized access to data. The data has been altered.
Set of icons: warning, cloud, globe, wifi, computer, phone, email.
Personal data protection icon.  Accounting and protection of personal data from unauthorized access to them
Data Protection banner illustration line icons representing digital security concepts safeguarding sensitive user information cybersecurity ensuring data privacy against unauthorized access
Security Icons Grid. Outline icon set of security warnings: lock, shield alert, breach detected, unauthorized access, firewall,
Danger Sign Unauthorized Persons Keep Out
Grunge rubber stamp indicating a document has limited access for security and confidentiality protocols
Flat illustration of two people configuring firewall settings network security and blocking unauthorized access
Authorized personnel only sign no unauthorized persons
A hand symbol inside a circle with a diagonal line, indicating access denied.
Protect accounts from unauthorized access with the account takeover icon, implementing measures to prevent and mitigate account hijacking incidents.
Not authorized Icon
Isolated sign of do not enter sign, no trespassing, authorized personnel only, prohibit people from passing sign
Cybersecurity Professional Detecting Threats, Digital Data Vulnerability and Encrypted Protection
Lock Prohibited
A hotel using palm recognition to prevent unauthorized individuals from entering guest rooms.. Vector illustration
Image icon for unauthorized access to an information network.
Flat vector icon pack of internet-related hazards: DDOS attack, malware injection, phishing, unauthorized access, and data breach
Stop Hand Forbidden sign symbol, don't touch
Diverse security icons representing data protection privacy and digital cybersecurity concepts
Fraud Detection icon. Guard against bank card fraud and unauthorized transactions. Enhance payment security to prevent credit card scams and financial crimes. Vector isolated icon on white background
Keylogger Protection is software that blocks unauthorized recording of keystrokes to safeguard sensitive input information.
Leaked information stamp vector illustration graphic design set
Access Denied Vector Filled Icon Design
 No car vector. Not allow car sign. The red circle prohibiting sing
Security Lock: A simple, black padlock signifies security, privacy, and protection against unauthorized access.
A prominent red grunge style rubber stamp warns against any unauthorized access after business hours
Tailgating and piggybacking soft blue concept icon. Physical security threat and risk. Unauthorized entry. Round shape line illustration. Abstract idea. Graphic design. Easy to use in booklet
No Entry Authorised Persons Only Prohibition Sign M_2209002
An open padlock with an eye symbolizes unauthorized access and data vulnerability.
Cyber Attack Prevention and Network Security with Firewall, Unauthorized Access, and Secure Laptop Protection
A simple illustration of a padlock symbolizing security and protection against unauthorized access. Black on transparent background.
Cybersecurity icons: firewall, lock, shield, alerts, spyware, https, warnings
An antitheft device that uses advanced technology to protect your belongings from theft and unauthorized access.. Cartoon Vector.
Unauthorized Access icon Simple outline vector logo
vector illustration of a firewall blocking unauthorized access unique design cybersecurity backgrounds
Icon preventing unauthorized access to a server.
Cyber security icons: lock, key, and shield in linear style for secure connections
Cybersecurity flat icons set. data protection and online security symbols
Cyber security vector illustration. Firewall software acts as digital guard, protecting against unauthorized access Personal privacy must be safeguarded through secure digital systems Support
Access denied Icon
Access denied Icon
Security Breach Alert multiple icon
Access Denied Multiple Style Icon Set Collection.
Unauthorized Single Pack Multistyle Illustration
Security Icons Grid. Outline icon set of security warnings: lock, shield alert, breach detected, unauthorized access, firewall,
Distressed rectangular rubber stamp with DO NOT ENTER text, signifying restricted access or prohibition warning
Cyber Crime Icons Pack,Remote Access Filled Line Icon
access denied stamp
Insider Threats Icon
Protect accounts from unauthorized access with the account takeover icon, implementing measures to prevent and mitigate account hijacking incidents.
A close-up of a padlock symbolizing security and protection against unauthorized access.
Staff Only with icon signboard | unauthorized person not allowed | Staff  level
Exploit Coverage is coverage, found in some cyberpolicies, that generally covers the insured for claims related to unauthorized access, text concept background
Secure document and folder icons with locks and shields
Network Security Threat With Hacker And Data Breach Warning Illustration
Unauthorized Access icon vector outline symbol or illustration
User verification. Unauthorized access prevention, private account authentication, cyber security. People entering login and password, safety measures. Vector isolated concept metaphor illustration
Remove access Icon
Vulnerability Icon Set Multiple Style Collection
Silhouette of person in hoodie, depicting hacker, anonymous individual, or someone incognito. Signifies cyber threats or unknown digital presence.
Not authorized Icon
Data Breach multiple icon
Hacker Stealing Password and Digital Information Trough Internet
Not authorized Icon
Cybersecurity icons: security breach, alarm, shield, alert, data, server
Distressed red deny access stamp, slanted rectangular shape, worn texture effect, security concept
Modern key icon representing access security and protection against unauthorized entry on red background
Unauthorized Access icon thin line outline set or collection
Healthcare audit trails icons set – flat, outline, compliance and access symbols
Ensure data privacy with the data privacy icon, implementing policies and technologies to safeguard personal and sensitive information from unauthorized access and misuse.
Icon preventing unauthorized intrusion of remote access server.
Cyber security shield protects laptop from digital threats and unauthorized access enhancing online safety
Detection Unauthorized Access Alert Icon
user access failed blue icon sign vector
A computer monitor icon with a padlock over binary code, symbolizing data encryption and cybersecurity. Represents protecting sensitive digital information from unauthorized access and threats.
Digital security measures for protecting sensitive data online and preventing unauthorized access through strong authentication protocols
Authorised push payment fraud with real-time scams, social engineering and account manipulation. Protect digital payments and financial data. Fraud mobile notification vector illustration and icons
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Data protection icons set – linear, security and privacy symbols for digital safety
Mobile Security App is an application that protects smartphones from viruses, tracking, or unauthorized access.
Not authorized Icon
Locked Laptop with Keyhole A laptop with a large keyhole in the center surrounded by digital locks and alerts the concept of securing personal devices against
Remove access Icon
Hazardous area warning sign and labels no unauthorized personnel beyond this point
Home security system elements showing various protection measures against threats and unauthorized access in a modern and minimalist style.
Unauthorized Access icon Flat design on isolated background
backdoor, trapdoor, unauthorized, access, cyber security solid or glyph icon
Access denied notification
Server Locked Icon
System Vulnerabilities and Exploit Detection with Unauthorized Access, Malicious Website, and Infected Server Risks
Access denied Icon
Access denied Icon
Cyber Attack Prevention and Network Security with Firewall, Unauthorized Access, and Secure Laptop Protection Darker Background Version with Editable Stroke and Colors.
Next page
/ 10