Symbolic image, China cyber attacks, Huawai critical infrastructure, 5G networks, cyber security, worldwide, computer crime, digital IT attacks, economy, energy industry, nuclear power plants, society, hackers, data theft, espionage, malware, phishing attacks, spoofing, passwords, DDOS attacks, competition, secret services, organised crime, Germany, Europe
Caption

Symbolic image, China cyber attacks, Huawai critical infrastructure, 5G networks, cyber security, worldwide, computer crime, digital IT attacks, economy, energy industry, nuclear power plants, society, hackers, data theft, espionage, malware, phishing attacks, spoofing, passwords, DDOS attacks, competition, secret services, organised crime, Germany, Europe

Date

Nov 18, 2024

Credit line

Photo12/imageBROKER/Kurt Amthor

Reference

BRK24I68_072

Model release

No

Property release

No

License type

Rights managed

Available size

83,4Mb (4,3Mb) / 15,0in x 21,7in / 4488 x 6496 (300dpi)

Keywords

concept concepts deserted no one No People nobody uninhabited empty society societies crime criminality software computer program computer software power generation power generations energy production power supply electricity supply power supplies energy supply nuclear power plant nuclear power plants nuclear power station NPP power plant power plants power station power stations online on-line technology technologies competition attack attacks problem problems symbolic picture symbolic pictures symbolic image Concept image Symbol image Symbol photo Theme picture illegality illegalities digital digitally critical symbolic symbol symbolise symbolize symbolizing symbolising criminal dangerous spy spying spies fight fighting fights battle battles fight fighting global world-wide worldwide internet www web internet infrastructure infrastructures energy source energy sources computer crime cybercrime cyber crime hacker hackers computer hacking computer hackings hack hacking danger dangers risk data theft data thefts power industry energy industry power industries risk venture nuclear energy nuclear nuclear energy nuclear power secret service secret services intelligence service hacker attack hacker attacks illegal virus protection virus protection economy economies Business industrial building industrial buildings phishing phishing espionage espionage spying IT information technology cybercrime cyber criminality Malware Cyber Cyber attack Cyber attacks IT attacks Cybersecurity

Please log in to download the high resolution file