Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Child welfare: Sad child hiding face, comforted by adult hand and teddy bear
Flat illustration of man managing cybersecurity for remote work telecommuting security
Security Audit multiple icon
Risk Assessment Icon Element For Design
Abstract symbols linear icons set
Failure Mode Outline Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Secure Coding Icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Security Breach Icon
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Security Breach White Icon Set Design
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Market Data Icon  in black line style icon, style isolated on white background
Dark Web Hacker Deal: Cyber Crime, Online Fraud, Data Breach. Anonymous Criminal Buying Stolen Information. Internet Security Concept. Digital Piracy and Cyber Attack.
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Collection of outline shield icons, some broken and some intact, representing protection, security, and vulnerability, alongside a radiator and kite icons, suitable for graphic design, web, apps, and
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
hacker logo. vector. editable.
Damaged utility pole, leaning silhouette, broken power line, storm damage infrastructure, electricity distribution failure, fallen pole, urban energy grid, vulnerability
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Silhouette of a person with roots growing from their chest, symbolizing growth and connection to nature.
AI Safety secure data attack vulnerability prevention concept with icon smart machine learning security Protection Privacy Artificial Intelligence Design
Exploit Icon
Security and Privacy Icons: Testing, Impact Assessment, and Operations Management
Risk Assessment and Mitigation Plan Icons Highlighting Security, Problem Solving, and Strategic Business Maintenance
Server data security network protection infographic template layout
A businessman in a blue suit carefully walks a tightrope, holding a yellow umbrella for balance above a safety net.
Cybersecurity, malware detection, online security, digital threats, internet safety, data protection. Funnel leading towards a bug with a video play icon. Cybersecurity and malware detection concept
Tiny Boat in Giant Wave Silhouette
Cyber threat Icon
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
Risk Blue And White Icon Style Collection
The five-step risk management and compliance process workflow
Minimalist line art collection featuring grieving human silhouettes in fetal positions and expressive rabbit faces representing vulnerability, mental health awareness, anxiety, depression, and sorrow.
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Barren Landscape: A stark illustration of a desolate landscape, where cracked earth and withered trees stand as a testament to nature's harsh realities.
A stark contrast lush greenery and a barren drought stricken landscape
Firewall Icon Set Multiple Style Collection
Two people covering their faces with hands a striking black silhouette
Digital shield protecting user data on a circuit board background, cybersecurity concept
Illustrations depicting the stages of aging in elderly women with walking sticks
Black line icons depicting various computer viruses and bugs affecting technology and data.
Decryption Icon
Earthquake damage icons show cracked buildings collapsing structures illustrating seismic activity destruction risk and urban vulnerability
Set of 12 black line icons for cybersecurity threats and protection including malware, surveillance, encryption, and network security symbols
Data security concept with man holding shield and lock for protection. Flat character design vector illustration for cyber security, privacy, safety and data protection concepts.
Digital security shield with a padlock icon representing cyber protection
Database Security icon set. Includes database, security, encryption, firewall, access, authentication and More. Editable Stroke Icon Collection.
Cyber security and data protection icons with locks shields bugs and firewalls symbolizing network defense and threat prevention
Security Testing Icon
Security scan icon in black. flat graphic vector icon
Explaining Cyber Security Tips Young Man Pointing To A Computer Screen In Modern Workplace
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Set of broken knives, symbolizing danger, fragility, and the end of conflict.
Digital security padlock icon with network connections on a dark blue background
Secure and insecure internet connections concept with padlock symbols
A striking illustration of a broken chain link representing weakness and the end of a connection, ideal for projects conveying concepts of failure, freedom, or overcoming challenges in
Navigating Perilous Waters A Solo Voyage Amidst Looming Danger
Cyber security icons collection showcasing various elements like shield, network, and encryption in a grid layout
Broken light bulb with electronic circuit inside symbol of failed idea.
Broken hearts and healing a collection of emotional heart icons
International Women's Day Poster with Raised Fist, Bandages, and Growing Flowers representing Strength and Healing.
Threat Icon
Cyber criminals using a key and document to steal personal information from a giant smartphone with an open lock to show data breach.
Cybersecurity and data protection line icon set featuring symbols for firewall, virus protection, cloud security, network vulnerability, and user privacy in a minimalist vector style
Set of Antivirus line icon. Pictograms of software, threat, safety, tech, security, anti, defense and more. Outline icons pack. Protect icon set. Editable stroke. Pixel Perfect.
Cybersecurity threat line icons set illustrating virus, malware, phishing, ransomware, hacker, cyberattack, DDoS, data theft, keylogger, worm, trojan horse, exploit, vulnerability, and breach concepts
Collection of Security Shield Icons and Symbols.
The Ultimate risk Styles with Variations Line of icon set vector illustration
Vulnerability Logo Variations. Facing a personal crisis with vul
Heart Padlock Logo Variations. Set Logo of Vulnerability Symbols: Unlocked Padlock with Heart. Logo set in vector style, emblematic variations. line, bold
Industrial work boot with small flower silhouette, tender shift and emotional resilience concept, strength and vulnerability in workspace vector icon
Risk Assessment web banner icon concept, with Economic Risk, Public Debt, Inflation Rate, Currency Stability.
Motorcycle Helmet Impact and Damage Set.
Extensive collection of modern security and lock icons for digital and physical safety
Security Monitoring Dashboard UI Template with Risk Score, Alerts by Severity, Login Activity and Events Table
Black and white doodle of a heart pierced by an arrow representing love and emotional connection, suitable for romantic greeting cards, Valentines Day decorations, or tattoo shop branding.
Cybersecurity icon set. Includes cybersecurity, security, firewall, encryption, malware and More. Editable Stroke Icon Collection.
A businessman unlocking a large padlock with a giant key, symbolizing security and access control.
Sharp USB drive piercing and dripping with dark liquid, symbolizing digital danger or intrusion
Business Compliance Icons: User Profile, Update Compliance Tracker with 'X' mark, Vulnerability Fix.
Three black hearts depicting stages of damage a striking silhouette
Detection Icon
Baby footprints one dark and one outlined a simple graphic silhouette
Sql Injection
Incident Multistyle Icon Set
Information Technologies Horizontal Banners
Icon of a hand receiving an electric shock from a frayed wire, symbolizing danger and electrical hazard
Vulnerability  Icon Set Multiple Style Collection
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Finger pointing at cyber security lock
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Breach icon sheet multiple style collection
Next page
/ 10