Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Broken shield icon Simple thin outline
A distressed figure sinking and a reaching hand emerging from dark waters
Cybersecurity Fundamentals web banner illustration featuring Cybersecurity, Malware, Phishing, Social engineering, Exploit, Vulnerability, and Password cracking.
Cybersecurity line icon set with padlock shield firewall user fingerprint cloud code globe and bug symbols
Crisis Emblem Variations. Facing a personal crisis with vulnerability. Icon set. Set Logo of Facing a personal crisis with vulnerability: broken circle.
Vector illustration of, on transparent background Secure Wi-Fi network shield protection icon set
Abstract technology security  global network background, vector
Digital lock protect data flow in global network
Icons depicting the impact of flooding on homes and individuals Vector
Overwhelmed person bowing head amidst explosion of abstract colorful geometric shapes, symbolizing stress
Training icon set multiple style collection
Threat Analysis web banner icon set vector illustration concept for business with icon of Threat Detection, Incident, Vulnerability, Security Patch, Investigation, Malwa.
Computer Security Bug Icon
Print
Large set of black silhouettes featuring elderly men and women walking with canes in various hunched and standing poses for geriatric care and senior health concepts
Cyber Security Icons Set Shield Protection Data Network.
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Data Breach icon set. Includes data, breach, cyber, attack, hacking, leak, exposure and More. Editable Stroke Icon Collection.
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
Computer cybersecurity infographic shield padlock monitor data protection template
Powerful tsunami wave towers over city and boat illustrating catastrophic flooding danger urban vulnerability and nature’s destructive force
Cyber security threats on smartphone. System vulnerability warning. Mobile phone hacking. Cybercrime or antivirus concept. virus, malware, ransomware, or bug. Flat cartoon icon. Vector illustration.
Illustration of black and white brick wall with shield and arrow graphic illustrations
Mental distress, fatigue, depression and contamination warning signs, headache and toxic fumes
A collection of cybersecurity icons for protecting computer systems and data
Set of hand-drawn business icons representing supply chain, logistics, network, connectivity, and technology concepts in a simple black and white sketch doodle style illustration
Set of cybersecurity line icons for information technology including vulnerability, system analysis, malware detection, risk assessment, and compliance check symbols
Fractured Lines: A graphic representation of three cracks, embodying fragility and imperfection, isolated and simple.
Stylized computer bug icon representing a software vulnerability or cybersecurity threat
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Cyber Security icon collection set. Simple color fill vector illustration.
Modern Slavery and Human Trafficking Concept: Tied Wrists with Price Tag and Barcode Symbolizing Exploitation and Commodification of Labor
Sea turtle and coral reef icons, symbolizing marine life protection, ocean conservation, and coral reef resilience against environmental changes
Information technology icon set. Cybersecurity, secure connection, privacy, encrypted, firewall, online protection
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Cybersecurity vulnerability scan vector finding weak point in system
Network security vulnerability icons with crossed out locks for cyber threat assessment
Cyber Threat Icon Set Multiple Style Collection
A wilting potted plant with drooping leaves and a cracked container symbolizes neglect and hardship, perfect for conveying themes of environmental issues, struggle, or vulnerability in
Broken padlock icon symbolizing security breach vulnerability and unauthorized access representing a critical failure in data protection
Powerful tsunami wave towers over city and boat illustrating catastrophic flooding danger urban vulnerability and nature’s destructive force
Broken hearts and healing a collection of emotive heart icons
Four red broken heart icons, illustrating heartbreak and sadness with different crack patterns
Set of red broken hearts with cracks on white background, symbolizing heartbreak and emotional pain
A simple black silhouette depicts a brick wall being broken by flames and resulting debris high quality professional
Hammer striking and shattering a surface depicted in a simple black and white illustration
Colorful broken chain links symbolizing disconnection and failure in relationships
Vector silhouettes of people showing various insecurities: social, inner, physical and digital addiction isolated on white background
Young hacker girl in hoodie and glasses working on laptop in dark room with multiple computer screens displaying code and security symbols
risk Two-tone version in black and white background
Damaged old iron fence showing security problem
Structural Glitch and Distortion Illustration - Abstract Data Rupture and Network Failure
Cybersecurity intelligence line icons collection. Threats, Breaches, Hacks, Malware, Vulnerabilities, Pentesting, Encryption vector and linear illustration. Firewalls,Intrusion,Phishing outline signs
A detailed illustration of a rifle viewed from the side in a neutral background
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Team of people working on data protection and cyber security, safeguarding information privacy.
Risk  Icon Set Different Style Collection
Security icons for digital protection.
Shopping basket next to warning triangle and bug icon highlights cybersecurity risks in online shopping. Ideal for e-commerce security, warning, technology, software vulnerabilities, online safety
Supply Chain Risk Icon
Stylized black wave curls toward small island with palm trees symbolizing ocean power danger isolation and tropical vulnerability
Vulnerability Multistyle Icon Set
Cyber security icons outline style, data protection and network safety concept, shield secure lock cloud computer privacy technology vector set
Social volunteering or social care concept. With three illustrations of social workers helping elderly and disabled people. Flat vector illustration
Risk
Cybersecurity icons: data encryption with user groups, authentication with multiple people, and firewall protection with server rack.
 risk
Dramatic silhouette of falling man in distress, vector illustration for anxiety concepts, accident prevention campaigns, and crisis management visuals
Abstract polygonal illustration of a fetus within a womb with pregnancy text
Virus on laptop, malware or network vulnerability vector
Protección de las personas mayores o tercera edad.
Understanding the threat of malicious software and its impact on digital security
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Frayed rope symbolizes tension and potential breaking point.
Vulnerability search. SEO optimization,web analytics, programmin
Financial security icons collection featuring shield, currency, and protection symbols in a grid layout on a white background
Cyber Crime Attack. Cyber Security Alert With Glowing Unlock Icon In Red Protective Sphere, Digital Cybersecurity Warning Banner For Online Safety, Futuristic Tech Threat Concept, Vector Illustration
Cyber Crime and Data Breach Hooded Hacker Exploiting Network Vulnerabilities
Security shield with exclamation mark warning icon
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Stylized black wave curls toward small island with palm trees symbolizing ocean power danger isolation and tropical vulnerability
Vulnerability text with decimal number background
Genetic Risks Icons. Line style vector icons of genetic discrimination risks: redlined genome band, exclusion barrier arc, unequal
Threat Analysis web banner icon vector illustration concept for business with icon of Threat Ranking, Competitive Forces, Rival Gap Analysis, Threat Monitor, Rival Pressure, Rival Breakpoint.
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Root Cause Icon Element For Design
Vulnerability Icons
a dramatic scene showing a man yelling at a woman with evident distress depicted in a stark black and white silhouette
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Bug fixing doodle for improve website performance
Sign of Meltdown and spectre vulnerability on notebook monitor
Vector illustration of houses in a flooded neighborhood with trees and water, highlighting natural disaster impact on residential areas
Digital Security and Network Protection Concept, Cybersecurity and Data Privacy
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Broken padlock icon set representing data breach security failure and vulnerable lock system in different styles
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Three red heart sculptures melting and dripping, symbolizing heartbreak and changing emotions
Padlock and cog wheel on printed circuit board. secure system concept with a Padlock. Cyber security technology concept abstract background futuristic Hi-tech style. Vector and Illustration.
Next page
/ 10