Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Cyber threat Icon
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Flat illustration One man coughed and sneezed continuously because the dust and smoke were damaging his lungs.
network warning glyph icon
Cyber Risks Icon Style
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
user protection icon sign vector
Code Legacy  Icon Set Multiple Style Collection
Security Patch icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Security Patch Vector Icon. Shield with an adhesive bandage, fixing software vulnerabilities, isolated sketch for cybersecurity, updates, system maintenance
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
A comprehensive set of icons illustrating various aspects of cyber attacks, including threats, defenses, and security measures.
Threat Intelligence Icon Lineal Blue Style
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Failure Mode Outline Icon
Threat Icon
Digital lock protect data flow in global network
Risk Factors Icon
Exploit Icon
Cybersecurity and Privacy Concept: Digital Shield, Secure Data Protection, Encryption, Firewall, Privacy Protection, Technology, Online Safety, Cyber Defense
Website bug detection software security vulnerability testing and malware analysis tool
Data security with chart and lock icon illustration
Security Risks Icon Style
Information security analyst icons outline key concepts like surveillance, access control, and data protection. Outline icons set
Broken shield icon Simple thin outline
Cyber Security Icon
Cyber threat Icon
 risk
AI technology in security set. Characters using artificial intelligence, algorithms, generative tools for data protection, cybersecurity, privacy, hacking threats prevention. Vector illustration.
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
phone virus hack icon sign vector
Risk Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Threat Icon
Negletful Parenting Style. Flat Vector Illustration
Insecure Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Cybersecurity Risk Icon
Detection Icon
Vulnerability Icon
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Penetration Testing Icon
Illustration of a man using a laptop with an unlocked password, signifying data security issues Consider using it for cybersecurity or data protection concepts.
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Misconfiguration Icon Lineal Syle
Security Breach
Ethical Hacking Icon
Weakness Outline Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Hacker activity icon set collection. Simple line color vector.
Risk  Outline Icon
Penetration Testing Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Insider Threat Icon
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Security warning shield indicating a potential threat or vulnerability
Cyber threat Icon
Vulnerability Assessment Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
computer protection icon sign vector
Cybersecurity Icons Data Protection, Privacy, and Network Security
shield X glyph icon
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
vulnerability line icon
Risk Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Hacker activity icon set collection. Simple line vector.
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Penetration Testing Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Cybersecurity Risk Icon
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Cybersecurity Vector Icon Set | data protection, malware, phishing, email threat, firewall, secure server, hacking alert, cloud security, virus warning, encryption, software bug, password lock
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Penetration Testing Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Exposure Icon
Security Vulnerabilities Outline Color Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Risk icon sheet multiple style collection
Laughter and tears mingle together as the poets share their work their vulnerability and strength shining through with each verse.. Vector illustration
Detection Icon
Next page
/ 10