Symbolic image hacker, cyberattack on public buildings, administrations, institutions, transport infrastructure, digital blackmail, data theft, online criminal offences, cyber extortion, ransomware
Légende

Symbolic image hacker, cyberattack on public buildings, administrations, institutions, transport infrastructure, digital blackmail, data theft, online criminal offences, cyber extortion, ransomware

Date

26 févr. 2024

Crédit

Photo12/imageBROKER/Jochen Tack

Notre référence

BRK25A64_489

Model release

Non

Property release

Non

Licence

Droits gérés

Format disponible

161,9Mo (5,9Mo) / 79,5cm x 51,0cm / 9393 x 6025 (300dpi)

Mots clés

concept concepts deserted no one No People nobody uninhabited empty building buildings structure construction constructions administration administrations authority authorities government agency crime criminality software computer program computer software computer PC computers personal computer data transmission data transmissions data data electronic electronics online on-line technology technologies railway track rail railway tracks railroad track rails railroad tracks track tracks rail traffic rail traffic transport transports transportation attack attacks problem problems protection protect shelter attentive attentively watchful watchfully alertly alert communication communications symbolic picture symbolic pictures symbolic image Concept image Symbol image Symbol photo Theme picture illegality illegalities threaten threatening threatens intimidate intimidating intimidates threatening information information digital digitally electronic train station building train station buildings railway station building station building means of transportation means of transportation protect protecting protects protective high tech high tech symbolic symbol symbolise symbolize symbolizing symbolising criminal secure save safely thief thieves steal stealing steals stolen dangerous threatening menacing spy spying spies fight fighting fights battle battles fight fighting technical tech state national governmental data security data protection data collection data gathering data collections data entry internet www web internet internet connection internet connections anonymity anonymities station stations infrastructure infrastructures concentration concentration concentrate concentrating concentrates focus focusing focussing focuses computer crime cybercrime cyber crime hacker hackers computer hacking computer hackings hack hacking threat threats danger dangers risk data theft data thefts terrorism risk venture aggressive belligerent aggressively computing electronic data processing computings concentrated focused computer hardware computer hardware means of transportation means of transportation Means of transport anonymous computer science computer science website webpage websites computer virus computer viruses theft thefts burglary hacker attack hacker attacks safety security aggression aggressions attention attentiveness alertness attention illegal public Publicly institution institutions data misuse technology technology espionage espionage spying posture postures internet access internet access data security terrorist attack terrorist attacks Terror attack train station railway station train stations railway stations attack position IT information technology computing data handling data-handling data processing railway train trains railways railroad railroads Artificial Intelligence AI KI spying nosing out snooping out snoop out nose out spy Cyber Cyber attack Cyber attacks Computer security Cyberterrorism Computer hacker

Connectez-vous pour télécharger cette image en HD