Symbolic image cyberattack, computer crime, cybercrime, computer hackers attack the IT infrastructure of a city, Essen
Caption

Symbolic image cyberattack, computer crime, cybercrime, computer hackers attack the IT infrastructure of a city, Essen

Date

Oct 21, 2021

Credit line

Photo12/imageBROKER/Jochen Tack

Reference

BRK24F55_273

Model release

No

Property release

No

License type

Rights managed

Available size

83,3Mb (6,9Mb) / 22,3in x 14,5in / 6676 x 4360 (300dpi)

Keywords

concept concepts deserted no one No People nobody uninhabited empty dark darkness darkness evening evenings Evening scene city cities town urban urban municipal urban environment crime criminality network networks software computer program computer software computer PC computers personal computer data transmission data transmissions data data electronic electronics online on-line technology technologies attack attacks problem problems protection protect shelter attentive attentively watchful watchfully alertly alert communication communications symbolic picture symbolic pictures symbolic image Symbol photo Symbol image Concept image mobile illegality illegalities mood atmosphere threaten threatening threatens intimidate intimidating intimidates threatening information information digital digitally electronic protect protecting protects protective high tech high tech symbolic symbol criminal secure save safely thief thieves steal stealing steals stolen dangerous threatening menacing spy spying spies fight fighting fights battle battles fight fighting atmospheric data security data protection data collection data gathering data collections data entry internet www web internet internet connection internet connections anonymity anonymities night shot night at night night photograph night picture night photo nocturnal night view night view of nighttime nightshot Night photo night-time concentration concentration concentrate concentrating concentrates focus focusing focussing focuses computer crime cybercrime cyber crime hacker hackers computer hacking computer hackings hack hacking threat threats danger dangers risk data theft data thefts terrorism risk venture aggressive belligerent aggressively computing electronic data processing computings concentrated focused computer hardware computer hardware anonymous computer science computer science website webpage websites computer virus computer viruses theft thefts burglary hacker attack hacker attacks safety security aggression aggressions attention attentiveness alertness attention illegal evening atmosphere evening atmospheres evening mood evening hour evening shot data misuse offline espionage espionage spying posture postures internet access internet access data security atmospheric light atmospheric light light atmosphere Light mood light scene terrorist attack terrorist attacks Terror attack attack position IT information technology computing data handling data-handling data processing cybercrime cyber criminality spying nosing out snooping out snoop out nose out spy Cyber notebook Laptop computer Computer laptop notebooks laptop laptops Computer Laptop Cyber attack Cyber attacks p Computer security Cyberterrorism Computer hacker

Please log in to download the high resolution file