Search keywords: unauthorized
Images found: 2
Images per page:
Images from Adobe Stock
Password protection is essential, safeguarding sensitive information with secure authentication. Securing password protection methods prevents unauthorized access.
Dark web icon vector for hidden networks, illegal activity, and online anonymity. Ideal for illustrating cybercrime, security threats, and unauthorized data access.
Security Icons Grid. Outline icon set of security warnings: lock, shield alert, breach detected, unauthorized access, firewall,
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
 indicate spam detection, filtering, or preventing unauthorized messages in tech platforms
Unauthorized
Safety caution icon signifying no admittance for workers or unauthorized entry.
Security icons: privacy locks, shield, and restricted access symbols
Red prohibition symbol with a diagonal line across a circle isolated on transparent background
Industrial and environmental regulation vector icon set. Vector Illustrations. EPS Editable
A simple black silhouette of a classic padlock with a keyhole representing security privacy and protection against unauthorized access
Black parachute symbol with no unauthorized text no unauthorized parachute sign prohibition
Unauthorized Access icon vector. restricted account access on laptop symbol. vector illustration.
Line style icons of Web3 licensing: license revocation tool, expired rights alert, blacklisted content badge, unauthorized usage warning, contract breach flag, takedown request icon, content lockout
Abstract geometric lock symbol representing security and protection against unauthorized access
Copyright icon vector. copyright sign and symbol
A dense crowd of matte black silhouettes, with a striking red figure in sharp contrast under a spotlight, emphasizing the peril of insider threats in data environments
No entry sign symbolizing restricted access and boundaries, clearly indicating a prohibition of entry to unauthorized individuals
Endpoint security concept depicting network systems protected from data breaches, unauthorized access, generative AI threats.
Anti-drone defense system operated by engineers with radar tracking and signal jamming to stop unauthorized UAVs in secure no-fly zones.
Securely delete sensitive files protecting your information from unauthorized access
Two programmers are working on their laptops, securing files and folders with data encryption and implementing security measures to prevent unauthorized access
Fraud Detection is a security process identifying unauthorized or suspicious activities to prevent financial losses.
A flat icon of a businessman crossed out by a red prohibition symbol, representing being fired, laid off, or unauthorized personnel.
Security Icons Grid. Outline icon set of security warnings: lock, shield alert, breach detected, unauthorized access, firewall,
Data Protected Icons. Black and White Vector Illustration. Padlock and Database. Information Safely Stored, Safe from Unauthorized Access, Loss, or Disclosure. Password and Data Security Concept
Modern security technology icons set with surveillance and protection tools
Distressed red rectangular rubber stamp indicating an important COVERAGE EXCLUDED status diagonally across the frame
A police line with “Do Not Cross” tape blocking access to an area under police investigation. Used to secure crime scenes, accidents, or violence cases to prevent unauthorized entry and ensure safety
No entry for unauthorized persons prohibition sign icon
Not authorized Icon
Red Confidential Rubber Stamp Seal, Indicating Secret, Private, and Restricted Information
Hooded Hacker Stealing Data from Smartphone with Malware Attack.
Locked purple door with unlock label next to blue cloud. Represents data security, access control, and digital privacy. Ideal for cybersecurity, cloud services, privacy, technology, IT encryption
Black padlock icon with three asterisks representing a password
Computer monitor with hand reaching through, for hacking, cyber intrusion, or unauthorized system access. Symbolizes digital threats and security breach.
Data Protected Icons. Black and White Vector Illustration. Padlock and Database. Information Safely Stored, Safe from Unauthorized Access, Loss, or Disclosure. Password and Data Security Concept
unauthorized access icon flat thin outline art logo
No Smoking and Vaping Allowed Signs. Cigarette and E-Cig Prohibition Symbols. Smoking Area Vector 10 eps.
A fingerprint graphic is bisected by a red no symbol with a stylized pixelation effect on the left
API Error Icons. Line style icons of error handling in APIs: 400 bad request, 401 unauthorized, 403 forbidden, 404 not found, 500
A simple black silhouette of a padlock with a white keyhole representing security and protection against unauthorized access
Flat vector icons of safety signage: hard hat required, no unauthorized entry, fire extinguisher sign, warning triangle, electric hazard icon, scaffolding caution, danger tape, exit sign.
Step-by-step isometric illustration of an anti-drone defense system detecting, tracking, and disabling unauthorized UAVs using radar and electromagnetic jammer.
An illustration depicting icons representing approval and rejection. The imagery includes checkmarks, a cross, and hands interacting with a smartphone to show acceptance and denial.
Data Protected Icons. Black and White Vector Illustration. Padlock and Database. Information Safely Stored, Safe from Unauthorized Access, Loss, or Disclosure. Password and Data Security Concept
Fingerprint authentication icon set with biometric thumbprint scan, approved green check, rejected red cross, identity security verification symbol for mobile app UI web vector
Distressed style rubber stamp vector illustration indicating Critical Access Denied for security or restriction warnings
Access Denied Concept isometric set. Crossed key, locked file, restricted folder, no entry icon, forbidden sign, access blocked, padlock with cross.
Hacker  Brown Circle  Icon Design
Not authorized Icon
A powerful illustration of a blazing firewall, symbolizing a strong barrier against digital threats and unauthorized access. Perfect for cybersecurity, network security, and data protection concepts,
Data Security - protecting digital data in a database, from destructive forces and from the unwanted actions of unauthorized users, mind map text concept background
A close-up of a padlock symbolizing security and protection against unauthorized access.
unauthorized access grunge stamp design, vector, isolated on transparent background
Security Icon Grid. Outline icon set of security triggers: intrusion detection, firewall alert, login attempt, suspicious activity
Data Protected Icons. Black and White Vector Illustration. Padlock and Database. Information Safely Stored, Safe from Unauthorized Access, Loss, or Disclosure. Password and Data Security Concept
No entry sign with a businessman silhouette. A conceptual icon symbolizing restricted access, unauthorized personnel, or employee prohibition.
No smoking no vaping and smoking area sign set. Forbidden sign icon isolated on white background vector illustration. Cigarette, vape in prohibition circle and green allowed area. Vector illustration.
Stop, Danger deep excavation, fall protection required, No unauthorized personnel beyond this point
Firewall icon vector, representing network security and data protection. Ideal for cybersecurity, IT infrastructure, or privacy designs showcasing defense against threats and unauthorized access.
Ransomware data protection with secure file encryption, password shield and alert system for preventing cyber attacks. Ransomware data protection and stop unauthorized access flat vector illustration
Rejected Signature Icons. Line style icons of rejected signatures: crossed signature, invalid signature icon, pen error mark,
Isometric workflow of anti-drone operation from radar detection to electromagnetic disruption of an unauthorized aerial vehicle.
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access, and protected. Vector illustration web line icon collection
Intrusion detection flat outline concept icon. Physical security system. Identify unauthorized entry attempts. Modern line illustration with green glyphs. Conceptual visual. Easy to edit
Hacker in a dark hoodie stealing confidential data from a laptop computer folder. Cyber attack, internet crime, phishing, and online fraud concept. Torn paper sticker vector.
Data Breach Icon Set Multiple Style Collection
Cybersecurity precautions against unauthorized data access with keys, lock icons, cloud storage, and a hacker. Ideal for cyber threats, data protection, online security, IT infrastructure, hacking
Hacker  Black Circle  Icon Design
Not authorized Icon
Vector art of entry restricted sign indicating do not enter for unauthorized personnel only isolated on white background
Flat illustration of two people configuring secure cloud storage to ensure data integrity and prevent unauthorized access to online files
A simple graphic of a black padlock with a bright blue shackle symbolizing security and protection against unauthorized access
A vibrant 3D rendered folder icon with a gradient of pink to orange, featuring a prominent blue padlock symbolizing data security and privacy.
Copyright icon logo design. copyright sign and symbol
Engineers operating anti drone defense system with radar detection and directional signal jammer to disable unauthorized UAV in restricted airspace
Closed parking barrier gate restricting access to unauthorized vehicles
Cybersecurity flat vector icon representing secure global internet access, network data protection, user privacy management, and blocking unauthorized connections with padlock symbol.
A customer being prompted to change their password regularly as a measure to prevent data breaches and unauthorized access to their account.. Vector illustration
Blocked icon collection set. Editable stroke.
unauthorized access icon Simple thin line stroke
Secure communication methods protecting digital messages from unauthorized access and malicious threats ensuring data privacy
warning sign prohibiting entry for unauthorized persons vector illustration of a sign that does not allow anyone to enter except for officers in the area
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access, and protected. Vector illustration web line icon collection
Intrusion detection soft blue concept icon. Physical security system. Identify unauthorized entry attempts. Round shape line illustration. Abstract idea. Graphic design. Easy to use in booklet
A bold red "Do Not Enter" sign warns against unauthorized access. Modern flat vector sticker label with icon and badge style, transparent background
Cybercrime concept vector with hacker stealing passwords via phishing attack. Data breach, malware, internet security threat, identity theft, and computer fraud illustration.
Access denied screen icon in outline and color styles, vector symbol for restricted entry, failed login attempt, security block, and unauthorized access alert.
A solid black padlock icon symbolizing security and protection against unauthorized access
Padestrian allowed and not allowed vector illustration. Pedestrian movement sign design. Outlined pedestrian symbol. Man walking in simple form. Walking symbol with black fill. Vector illustration
Secure online authentication methods safeguarding personal data against unauthorized access and cyber threats
Crossing at unauthorized places.Woman running on crosswalk while distracted by phone, car waiting
Automatically sever connections when suspicious activity or unauthorized access is detected
Flat vector icon pack of internet-related hazards: DDOS attack, malware injection, phishing, unauthorized access, and data breach
Copyright icon logo design. copyright sign and symbol
Ambulance and emergency vehicles only unauthorized vehicles will be towed away sign isolated on a white background
flat black solid icon items isolated on white background network firewall (uses): malware unauthorized access content filter port control app security traffic limit
Access denied sign displays error message. Access denied inscription in bold letters alerts users to restricted entry, unauthorized action, or system protection.
A police line with “Do Not Cross” tape blocking access to an area under police investigation. Used to secure crime scenes, accidents, or violence cases to prevent unauthorized entry and ensure safety
Next page
/ 10