Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Secure digital identity management and data protection.
Vector illustration of shield with padlock icon symbolizing security and protection
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Laptop with password input, hacker hand holding keys, medical icons, warning sign, cloud upload, and servers. Ideal for cybersecurity, health data security, system breach vulnerability digital
shield X line icon
AI Safety secure data attack vulnerability prevention concept with icon smart machine learning security Protection Privacy Artificial Intelligence Design
Data Security Illustration: A simple yet effective visual representation emphasizing the importance of safeguarding data, a magnifying glass focused on the document alongside a shield.
Collection of various security and protection icons, including shields, locks, and network symbols.
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Security Vulnerabilities Blue Icon
Digital lock protect data flow in global network
Heart Vector Icon Set for Love, Breakup, Medical, and Security Themes - Editable Line Icons for Emotional and Health-Related Designs
Segmentation Icon
Disruption Icon
Compliance Icon
Symbols of Fragility. Hand-drawn doodle illustration vulnerability broken heart, cracked glass, wilting flower, falling feather,
Vulnerability Icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Vector health emotion mental wellness icon support badge vulnerability icons space couch
Different hacker icons representing cybersecurity threats, malware, and data protection solutions
Technology Shields Security,protection and Safe Concept,on Light Blue background Hi-tech and technology concept design.
A dramatic crack graphic with a realistic effect. vector illustration
Symbolic representation of a broken heart expressing emotional distress and vulnerability
Computer screen showcasing malware icons, error messages, graphs, notifications, user profiles, and bugs. Ideal for cybersecurity, online safety, IT risks data protection user authentication
Vector illustration depicting a broken surface with a central circular void radiating cracks
Digital age hacker with a laptop, illustrating cybersecurity and data breach
Leadership Vulnerability Icons. Outline icon set of vulnerability in leadership: heart open, cracked shield,
Silhouette of a hooded person using a laptop, symbolizing digital anonymity and privacy risks in the modern technological landscape
Vulnerability Icons Collection. Hand-drawn doodle illustration vulnerability open hands, tear drop, broken heart, shy face, folded
Digital fortitude, secure data transfer shield guarding against cyber threats, digital defense with lock 50 against online vulnerabilities protection
Digital lock protect data flow in global network
Injured man with a fractured arm and sling shows discomfort and sadness in a stylized vector illustration depiction of injury and vulnerability
Insider Threats Icon
Security Solid Icon Vector Illustration
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
Web browser security protection vector icon showing secure password entry with a verified shield, illustrating data privacy and online authentication
Threat Detection Icon
Silent Solitude: A silhouette of a person, lost in thought, sits alone against a neutral background. the poignant illustration captures a mood of introspection and reflection.
Cracked shield icon set. Minimalistic vector sign for web and graphic design. Symbol of broken security, vulnerability, danger, and data breach. Cyber attack concept.
Tear Drops Turning into Flowers A series of tear drops cascading down and transforming into blooming flowers at the bottom. This represents the idea that expressing vulnerabilities
Risk Icon Solid Black Style
A hand extending a golden key towards a padlock, while another hand emerges from a laptop screen to grasp it, symbolizing digital security and access.
A collection of six black security-related icons, including a shield, padlock, credit card with shield, brick wall with shield, brick wall, and a cloud with a shield.
Cybersecurity concept of a phishing attack targeting login credentials with a fishing hook over a username and password form.
Vulnerability in the Wall: A Strength Unveiled
Conceptual illustration of a cloud security breach with an unlocked padlock icon representing data vulnerability and risk.
Open document folder with warning triangle featuring bug icon symbolizing malware. Ideal for cybersecurity, data protection, antivirus software, IT risk, vulnerability assessment, online safety
Four cracked oval shapes in a row representing stages of breakage silhouette
Cybersecurity Concept with Person Holding Key and Padlock Icon.
Hacker Character Vector with Laptop: Scene for Cyber Security Awareness or Threat Presentation
Digital lock protect data flow in global network
Security Breach Icon
Botnet Icon
SQL Injection Icon
Ethical Hacking Icons. Line style icons of ethical hacking: white hat hacker, bug bounty report, secure code scan, vulnerability
Email Security Alert Vector Icon with Exclamation Mark and Question Mark
Vulnerability Icon
Line style icons of trust and empathy: trust bridge icon, open heart team, empathy bubble, vulnerability shield, honest talk symbol, safe space hands, caring icon, mutual respect badge.
Penetration Testing Icon
Cracked shield icon. Broken protection and vulnerability concept. Security failure, risk, and danger symbol. Unprotected data breach metaphor. Simple outline vector illustration.
CyberSafe Shield Digital Security, Data Protection, Privacy
Unprotected Website Vector Icon
Broken Chain Connection Error Security and Disruption Vulnerability Alert Problem Solving and Failure Concepts with
A digital security shield with icons representing data protection and user authentication.
Exclamation Mark in Red, White and Black Square with Rounded Corners
Symbols of Fragility. Hand-drawn doodle illustration vulnerability and feebleness open hand, fragile glass, cracked shell, broken
Cybersecurity Risk Icon
Cybersecurity Vector Icon
Security Analyst Presenting Threat Categories Data In Soc Center
Application security practices infographic 5 steps. Threat management, access control. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used
Digital lock protect data flow in global network
Hacking hand stealing keys, lock, and server icons, warning triangle, cloud, and leaking water. Ideal for data security, hacking, privacy threat vulnerability risk management digital protection
Vulnerability Icon
Illustration of siblings embracing at a refugee camp conveying resilience and unity
Cybersecurity threat: A worried person holding a tablet is alerted to a ransomware attack, depicted by a cracked skull shield, warning signs, and digital virus icons, symbolizing data breach and
Vector art of broken shield icons, symbolizing vulnerability, failure, and the aftermath of conflict in shattered pieces
Shattered black wine glass conveying fragility and consequence symbolizing breakage loss or
World Tsunami Awareness Day Graphic Featuring Earth and Wave
Patching Icon
Patch Icon
Risk Icon
Eavesdropping Icon
Threat Icon
Penetration Icon
Eavesdropping Icon
Honeypot Icon
Backdoor Icon
Digital lock protect data flow in global network
Data Breach Icon
Threat Icon
Vulnerability Icon
Penetration Icon
Decryption Icon
Digital lock protect data flow in global network
The key to safety enhancing cyber security protections
The key to safety enhancing cyber security protections
Detection Icon
Symbols of Fragility. Hand-drawn doodle illustration vulnerability and feebleness open hand, fragile glass, cracked shell, broken
Digital lock protect data flow in global network
Digital lock protect data flow in global network
Next page
/ 10