Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Network security specialist monitoring firewall defense system in a cyber security operation center
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Vulnerability Icon Collection Set Multiple Style
HACCP icon set containing hazard, analysis, critical, control and points vector icons.
Leadership Vulnerability Icons. Leadership vulnerability. Line icon set of leadership vulnerability: heart, shield, open hand, human head, speech bubble,
Threat Detection icon sheet multi style collection
Risk Icon Line and Black Fill Style Collection
Virus Icon Set Multiple Style Collection
Malware infection on document causing software security vulnerability concerns
Illustration of two people, one holding a key and the other a tablet, near a secure vault.
Illustration of a person in a hoodie and mask typing on a keyboard in front of computer screens
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Security Testing icon vector image. Can be used for Quality Assurance.
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Digital Guardian of the Web An Abstract Illustration Symbolizing Cybersecurity, Anonymous Protection, and the Enigmatic World of Online Data Networks
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
Hacker in Black Hoodie and Mask Working on Computer.
Training  Icon Element For Design
Website security vulnerability illustration showing software bug detection
Unprotected Website Vector Icon
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
vulnerability icon set multi style various collection
Cyber Risk Exposure Icon Set containing cyber hygiene, data sensitivity, threat landscape, regulation, vulnerabilities and third-party risk vector icons
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Cybersecurity threat icon set depicting a computer bug with an integrated circuit, representing malware, virus, software error, or system vulnerability
Classic car under lightning storm isolated on white background, representing danger, power, and the vulnerability of vehicles to weather
Collection of ten cracked shield icons in a vector cartoon illustration style, presented on a black background, representing concepts of broken security, vulnerability, and failed protection, ideal
broken padlock symbolizing a data breach, vector illustration for cybersecurity threat, information leak, and digital vulnerability
“The forest listens to their breath.”
Threat vector icon
Risk Assessment White Icon Set Design
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Risk Icon
Silhouette of a person curled up in a fetal position
Collection of security icons, representing safety measures, access control, and protection against threats and vulnerabilities
Set of five cracked shield icons in a line, drawn with thin black lines on a white background, representing broken security, vulnerability, and failure. Simple vector cartoon illustration.
Fake W White Icon Set Design
Training  Icon Element For Design
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Cracked shield symbolizing security threats and cyber vulnerabilities
Security Breach Icon
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Cybersecurity vulnerability concept with unlocked padlock and lightning bolt, highlighting potential security breaches and the importance of data protection
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Collection of fifteen cracked shield icons, hand-drawn in a white line art style on a black background, representing broken security, vulnerability, and damage, perfect for digital and print design
Eye with Lock and Key - Online Surveillance Awareness and Privacy Caution.
Set of 15 cracked shield icons, simple thin line art, perfect for websites, books, cards, and apps. Vector cartoon illustration representing broken security, vulnerability, and damage, isolated on a
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Ballot box icon, with cracks symbolizing security threats.
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Code Legacy  White Icon Set Design
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Collection of minimalistic outline icons representing cracked shields and a radiator, symbolizing broken security, vulnerability, and potential damage. Ideal for web design, app interfaces, social
Supply chain disruption management risk strategy vulnerability
Set of 15 cracked shield icons in a linear style, representing broken security, vulnerability, or damage. These vector graphics are perfect for graphic design, web sites, cards, books, and articles
Cybersecurity threat modeling process flowchart diagram with risk assessment and attack vectors
Cyber Attack White Icon Set Design
Threat vector icon
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Broken chain link illustration symbolizing weakness vulnerability or disconnection with clouds
Risk Icon
Collection of broken shield outline icons, representing concepts of security breach, vulnerability, and protection failure. Minimalistic linear pictograms suitable for web design, graphic design, app
Vulnerability Icon
Collection of cracked shield outline icons, representing broken security, vulnerability, and data breaches, perfect for websites, apps, and infographics, presented as a vector cartoon illustration on
Security assessment icon set multiple style collection
Global supply chain disruptions impacting business operations and financial stability worldwide
Cartoon tree bending under strong winds, illustrating nature's power and climate change vulnerability
Broken chain link connection failure concept metaphor for disconnect and vulnerability symbol for weakness
Set of ten minimalistic thin line icons representing cracked shields, symbolizing broken security, vulnerability, or failed protection. These vector graphics are ideal for web design, app interfaces
Set of seven linear vector shield icons with cracks, symbolizing broken security, vulnerability, or failure. These simple, clean line art illustrations on a white background are perfect for
Collection of cracked shield icons in a linear style, representing broken security, vulnerability, and loss of protection. These vector graphics are perfect for designs, books, adverts, and apps
Set of five cracked shield outline symbols, representing broken security, vulnerability, or failed protection. These versatile vector graphics are ideal for use in designs, books, advertisements, and
Delete your data with this vector trash can, a concept for data privacy and personal data security after a data breach in a vector graphic
Broken shield icons symbolizing security breach, failure, damage, and vulnerability protection
Cybersecurity line icon set. Vector pictograms of mobile protection, user access, server, hacker, malware, data storage, and biometrics, thin linear illustration.
Cookie Theft White Icon Set Design
Threat vector icon
Computers with data charts, security alerts, and warning icons highlighting web vulnerabilities and online shopping risks. Ideal for cybersecurity, e-commerce, online safety, IT, data protection
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Emotional Icon Array. Emotional Expression Collection linear icon set: joy burst, sorrow drop, compassion flame, gratitude beam, vulnerability symbol, calm breeze, open gesture
Collection of ten cracked shield line icons, representing broken security, vulnerability, and damage, suitable for websites, apps, and infographics, presented as a vector cartoon illustration on a
Secure data storage concept with blocks and padlock illustration.
Cybersecurity control room with analysts monitoring data on computers and security themed wall art
Cartoon capybara illustration depicting sadness and emotional vulnerability in the rain
Vulnerability Icon
Data security and protection concept with shield and cube icons
Weaknesses icon set in line and glyph style on black and white background
Distressed patient in hospital bed with IV drip, vector illustration for emotional healthcare, medical treatment, and patient vulnerability concept
Set of four cracked shield pictograms in a line, representing broken security, vulnerability, or failed protection. These vector illustrations are perfect for interface elements, social media posts
“Her love blooms beyond time.”

“Infinity wears petals and promise.”
Illustration portraying expressive eyes with tears conveying deep sadness and vulnerability
Vivid and dynamic cracked shield thin line icon, perfect for web, books, cards, and apps. This cartoon illustration features a stylized shield with a prominent crack, symbolizing vulnerability
Risk Icon
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Security Icon
Security Breach White Icon Set Design
Next page
/ 10