Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Network security specialist monitoring firewall defense system in a cyber security operation center
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Vulnerability Icon Collection Set Multiple Style
HACCP icon set containing hazard, analysis, critical, control and points vector icons.
Leadership Vulnerability Icons. Leadership vulnerability. Line icon set of leadership vulnerability: heart, shield, open hand, human head, speech bubble,
Collection of broken shield outline icons, representing concepts of security breach, vulnerability, and protection failure. Minimalistic linear pictograms suitable for web design, graphic design, app
Flashing Red Emergency Siren with Yellow Light Rays.
Risk Icon Line and Black Fill Style Collection
Threat Detection icon sheet multi style collection
Virus Icon Set Multiple Style Collection
Malware infection on document causing software security vulnerability concerns
Digital Guardian of the Web An Abstract Illustration Symbolizing Cybersecurity, Anonymous Protection, and the Enigmatic World of Online Data Networks
Security Testing icon vector image. Can be used for Quality Assurance.
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Illustration of a person in a hoodie and mask typing on a keyboard in front of computer screens
Illustration of two people, one holding a key and the other a tablet, near a secure vault.
Website security vulnerability illustration showing software bug detection
Data security and protection concept with shield and cube icons
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Hacker in Black Hoodie and Mask Working on Computer.
Unprotected Website Vector Icon
Supply chain disruption management risk strategy vulnerability
Training  Icon Element For Design
Cyber Risk Exposure Icon Set containing cyber hygiene, data sensitivity, threat landscape, regulation, vulnerabilities and third-party risk vector icons
Cybersecurity control room with analysts monitoring data on computers and security themed wall art
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Risk Icon
Classic car under lightning storm isolated on white background, representing danger, power, and the vulnerability of vehicles to weather
broken padlock symbolizing a data breach, vector illustration for cybersecurity threat, information leak, and digital vulnerability
Vivid and dynamic cracked shield thin line icon, perfect for web, books, cards, and apps. This cartoon illustration features a stylized shield with a prominent crack, symbolizing vulnerability
“The forest listens to their breath.”
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Cybersecurity shield with lock and circuitry
Broken chain link illustration symbolizing weakness vulnerability or disconnection with clouds
Silhouette of a person curled up in a fetal position
Set of five cracked shield icons in a line, drawn with thin black lines on a white background, representing broken security, vulnerability, and failure. Simple vector cartoon illustration.
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Fake W White Icon Set Design
Set of seven linear vector shield icons with cracks, symbolizing broken security, vulnerability, or failure. These simple, clean line art illustrations on a white background are perfect for
Missiles labeled DDoS moving toward a laptop and a box symbolizing system vulnerability and data targeting. Ideal for cybersecurity, digital threats, data loss, hacking, online safety, IT security
Threat vector icon
Training  Icon Element For Design
Cybersecurity vulnerability concept with unlocked padlock and lightning bolt, highlighting potential security breaches and the importance of data protection
Collection of fifteen cracked shield icons, hand-drawn in a white line art style on a black background, representing broken security, vulnerability, and damage, perfect for digital and print design
Eye with Lock and Key - Online Surveillance Awareness and Privacy Caution.
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Set of 15 cracked shield icons, simple thin line art, perfect for websites, books, cards, and apps. Vector cartoon illustration representing broken security, vulnerability, and damage, isolated on a
Security assessment icon set multiple style collection
Collection of minimalistic outline icons representing cracked shields and a radiator, symbolizing broken security, vulnerability, and potential damage. Ideal for web design, app interfaces, social
Set of five cracked shield outline symbols, representing broken security, vulnerability, or failed protection. These versatile vector graphics are ideal for use in designs, books, advertisements, and
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Set of 15 cracked shield icons in a linear style, representing broken security, vulnerability, or damage. These vector graphics are perfect for graphic design, web sites, cards, books, and articles
Risk Icon
Cybersecurity threat modeling process flowchart diagram with risk assessment and attack vectors
Collection of cracked shield icons in a linear style, representing broken security, vulnerability, and loss of protection. These vector graphics are perfect for designs, books, adverts, and apps
Security Breach Icon
Broken shield icons symbolizing security breach, failure, damage, and vulnerability protection
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Collection of ten cracked shield line icons, representing broken security, vulnerability, and damage, suitable for websites, apps, and infographics, presented as a vector cartoon illustration on a
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Threat vector icon
Cartoon capybara illustration depicting sadness and emotional vulnerability in the rain
vulnerability icon set multi style various collection
Vulnerability Icon
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Distressed patient in hospital bed with IV drip, vector illustration for emotional healthcare, medical treatment, and patient vulnerability concept
Set of four cracked shield pictograms in a line, representing broken security, vulnerability, or failed protection. These vector illustrations are perfect for interface elements, social media posts
Collection of security icons, representing safety measures, access control, and protection against threats and vulnerabilities
Global supply chain disruptions impacting business operations and financial stability worldwide
Broken chain link connection failure concept metaphor for disconnect and vulnerability symbol for weakness
Code inspection - uncovers errors in programming scripts through red magnifying lens and warning alert triangle. Debugging for software developers in quality assurance workflows. Vector illustration
Illustration portraying expressive eyes with tears conveying deep sadness and vulnerability
Cracked shield symbolizing security threats and cyber vulnerabilities
Cyber Attack White Icon Set Design
Risk Assessment White Icon Set Design
Cybersecurity line icon set. Vector pictograms of mobile protection, user access, server, hacker, malware, data storage, and biometrics, thin linear illustration.
Delete your data with this vector trash can, a concept for data privacy and personal data security after a data breach in a vector graphic
Emotional Icon Array. Emotional Expression Collection linear icon set: joy burst, sorrow drop, compassion flame, gratitude beam, vulnerability symbol, calm breeze, open gesture
Risk Icon
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Threat vector icon
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Secure data storage concept with blocks and padlock illustration.
Collection of ten cracked shield icons in a vector cartoon illustration style, presented on a black background, representing concepts of broken security, vulnerability, and failed protection, ideal
Vulnerability Icon
Collection of cracked shield outline icons, representing broken security, vulnerability, and data breaches, perfect for websites, apps, and infographics, presented as a vector cartoon illustration on
Ballot box icon, with cracks symbolizing security threats.
Weaknesses icon set in line and glyph style on black and white background
Cartoon tree bending under strong winds, illustrating nature's power and climate change vulnerability
Cybersecurity threat icon set depicting a computer bug with an integrated circuit, representing malware, virus, software error, or system vulnerability
“Her love blooms beyond time.”

“Infinity wears petals and promise.”
Young people helping erderly at the bus stop. Blind man with guide dog, old woman with a cane, elderly man in a wheelchair. Social helping concept. Vector illustration.
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Cookie Theft White Icon Set Design
Next page
/ 10