Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Security icons set for cybersecurity and data protection concepts
Secure Coding Icon
Black chain breaking apart with explosive force and fragments flying
Cyber Intelligence icon set black and white
Superheroes tending to their fallen comrade in a moment of solemn reflection
Illustration of a giant fist looming over a small man, symbolizing power imbalance, oppression, or challenge, isolated on on transparent background
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Vulnerability Icon Set Vector Collection Isolated In Black And White
DDoS attack concept. DDoS with missiles cyber threats and vulnerability by styled avocado. Cybersecurity tools protecting systems from DDoS. For online protection, IT solutions, data security, threat
Digital shield with a checkmark symbolizes secure data and network protection
User employing a laptop for digital tasks, prominently featuring a security shield and related icons, symbolizing robust online data protection, privacy, and cyber defense
Security Status Icons Secure and Warning Shields with Checkmark and Exclamation Point.
Data security and business professionals login forms silhouettes and laptops illustrated
Heart icon opening to reveal inner vulnerability concept illustration
A romantic couple stands face to face in a dramatic silhouette against a bright background
Dramatic black and white image of two human arms and claw-like hands emerging from darkness, evoking mystery and suspense.
Barbed wire dissolving into dust particles, illustrating concepts of freedom and destruction.
icon featuring a pen shaped like a shield but marked with a visible crack, symbolizing the vulnerability and risks faced by journalists who use their words as a weapon to defend the truth
Crisis management vector illustration. Blue concept with world map and icons related to crisis or risk management or crisis communication - recovery strategy - solutions to prevent escalation.
Illustrating the process of digital security and software testing for finding errors and vulnerabilities in code
Set of black chain link icons in various styles, including a broken link, representing connection, security, strength, and disconnection in a minimalist vector graphic illustration
A continuous line drawing of an elderly couple and a walking aid
Data Breach Icon Different Style Outline Collection Set.
Security Audit icon set black and white
Cybersecurity attack and defense icon set featuring network security, data protection, malware, phishing, hacking, encryption, firewall, and cyber threat prevention symbols.
Exploit Icon
Stages of a cyberattack onboarding mobile app screen. Access control. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI. Montserrat SemiBold, Regular fonts used
Threat Detection Icon Set Vector Collection Isolated In Black And White
Phishing concept. Diagram phishing threats linked to cloud and data hosting. Phishing shows risks in data hosting and cybersecurity. For tech security, education, cloud services, IT risks, and online
Broken Chain Connection Cybersecurity Concept
Security concept with a padlock key and a hand reaching for it
Digital Security and Privacy Concerns in Modern Life Illustrated by People and Technology
Protection simple icon set. Set of line pictogram. Privacy icon set. Contain linear sign cyber, antivirus, safe, safety, software and more.
Incident Multistyle Icon Set
Breach icon sheet multiple style collection
Sql Injection
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Open backdoor in a black wall cybersecurity concept illustration
security scan icon sign vector
Market Data Icon  in black line style icon, style isolated on white background
Data Protection Day illustration featuring a shield, padlock, binary code, cloud storage, and network nodes symbolizing cybersecurity and digital privacy.
Cybersecurity icon set for virus protection and malware detection. Vector concepts of security shield, computer bug, warning sign, and vulnerability scan for digital safety.
Cyber Security Icon Sheet Multiple Style Collection
Risk Management icon set black and white
Laptop icon infected by malware with long shadow on white backgr
Eavesdropping Icon In Black And White Glyph Style
Disconnected power plugs and network cable illustrate potential connection failures
Cyber Threat Icon Set Vector Collection Isolated In Black And White
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Broken chain link representing weakness and vulnerability in a simple line art drawing
Vulnerability  Icon Set Multiple Style Collection
Two hooded hackers with laptops and triangle symbols on screens in black and white
Illustration of a broken chain link symbolizing weakness or vulnerability.
Malware infection on document causing software security vulnerability concerns
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Information Technologies Horizontal Banners
Broken metal fence barrier creating gap
Hand unlocking a dark padlock against a geometric stylized background
computer virus icon sign vector
Finger pointing at cyber security lock
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
System Vulnerability Icon
Cyber Risk icon set black and white
Vulnerability  Icon Set Multiple Style Collection
Detection Icon In Black And White Glyph Style
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
Vulnerability Icon Set Vector Collection Isolated In Black And White
 Journey analytics helps businesses track and analyze customer interactions across multiple touchpoints, providing insights to enhance user experience and boost conversions
Broken shields show vulnerability and represent failure,Broken shield icons in bold and outlined styles.Broken Shield icon - vector. Security Shield icon in flat style. Symbols of broken protection.
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Digital privacy and smartphone security concept with a prominent padlock icon protecting mobile data. Flat vector illustration of secure device and online safety
Hacker attack on computer. Cyber security threat, data phishing concept. Anonymous criminal stealing login and password information. Internet privacy breach vector.
Emotional Intelligence icon set. Containing empathy, respect, resilience, compassion, mindfulness, expression, motivation, optimism, forgiveness, kindness, patience icon. Lineal Blue style
Black and white icon of a database server losing data protection from a cracked security shield
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Vector light Risk management process diagram schema
Security system icon set featuring alarms, detective, fingerprint, vulnerability, network, system,  and surveillance symbols for safety, monitoring, and protection projects.
Cybersecurity icons showcasing data protection, secure access, and biometric authentication for digital privacy and network defense in a connected world
Two people in distress a visual representation of sadness and despair silhouette
Disaster risk level infographic showing circular chart with risk categories and bar chart illustrating risk distribution, with icons representing weather, medical aid, and housing
Penetration Testing Icon
Firewall icon set black and white
A glowing blue shield with a checkmark symbol representing security and protection
Decryption Icon
A digitally rendered wireframe anatomical heart pierced by a cupid's arrow, symbolizing love, vulnerability, and emotional impact.
Malware Icon Set Vector Collection Isolated In Black And White
Cute chick standing next to broken eggshells on ground
Cyber warfare concept with military and hacking elements
Collection of security icons including shields locks firewalls fingerprints and warnings representing cybersecurity data protection and network safety in a modern design
Security icons illustrating digital protection measures, software vulnerabilities, and data encryption strategies
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
A line art of a person wrapped in a blanket, edge unravels, calming of chaotic thoughts outline vector illustration
Dynamic falling people silhouettes in abstract graphic style with stark black figures on a clean background for motion design.
Aging with Grace: A series of silhouettes depicts the passage of time, showcasing the journey through years. Each figure, with a cane.
Hacker Using Laptop for Cyber Attack Illustration
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Security shield logo with keyhole and broken lock, representing protection and vulnerability.
Secure protection shield with lock and arrow for safety and defense
Next page
/ 10