Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Detection Icon
Flat illustration One man coughed and sneezed continuously because the dust and smoke were damaging his lungs.
Penetration Testing Icon
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
AI technology in security set. Characters using artificial intelligence, algorithms, generative tools for data protection, cybersecurity, privacy, hacking threats prevention. Vector illustration.
Security Patch icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Security Patch Vector Icon. Shield with an adhesive bandage, fixing software vulnerabilities, isolated sketch for cybersecurity, updates, system maintenance
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
A comprehensive set of icons illustrating various aspects of cyber attacks, including threats, defenses, and security measures.
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Risk Icon
Failure Mode Outline Icon
Cybersecurity Vector Icon Set | data protection, malware, phishing, email threat, firewall, secure server, hacking alert, cloud security, virus warning, encryption, software bug, password lock
Website bug detection software security vulnerability testing and malware analysis tool
Cyber scanner Icon
Insecure Icon
 risk
computer protection icon sign vector
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Cyber Security Icon
Cybersecurity Risk Icon
Vulnerability Assessment Icon
phone virus hack icon sign vector
Penetration Testing Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Security Breach
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Threat Icon
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
Misconfiguration Icon Lineal Syle
Hacker activity icon set collection. Simple line vector.
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Negletful Parenting Style. Flat Vector Illustration
Cyber threat Icon
Vulnerability Icon
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Ethical Hacking Icon
Cybersecurity Risk Icon
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Risk Factors Icon
Cyber Risks Icon Style
shield X glyph icon
Exploit Icon
Weakness Outline Icon
Broken shield icon Simple thin outline
Threat Icon
Risk  Outline Icon
Threat Intelligence Icon Lineal Blue Style
Hacker activity icon set collection. Simple line color vector.
Penetration Testing Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Penetration Testing Icon
Self-Esteem Icon
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
user protection icon sign vector
Code Legacy  Icon Set Multiple Style Collection
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Cybersecurity Risk Icon
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Security warning shield indicating a potential threat or vulnerability
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
Information security analyst icons outline key concepts like surveillance, access control, and data protection. Outline icons set
Security Risks Icon Style
Cybersecurity Icons Data Protection, Privacy, and Network Security
network warning glyph icon
vulnerability line icon
Risk Icon
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Risk Icon
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Cybersecurity and Privacy Concept: Digital Shield, Secure Data Protection, Encryption, Firewall, Privacy Protection, Technology, Online Safety, Cyber Defense
Data security with chart and lock icon illustration
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Cybersecurity Risk Icon
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Vulnerability Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Security Vulnerabilities Outline Color Icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Exposure Icon
Vulnerability Icon
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
Next page
/ 10