Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Virus Icon Set Multiple Style Collection
Cybersecurity line icon set. vector pictograms of protection, shield, virus, phishing, and vulnerability, thin outline illustration.
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Vulnerability Icon Collection Set Multiple Style
Threat detection vulnerability scan security risk assessment icon vector eps silhouette
Leadership Vulnerability Icons. Leadership vulnerability. Line icon set of leadership vulnerability: heart, shield, open hand, human head, speech bubble,
Flashing Red Emergency Siren with Yellow Light Rays.
Broken shields show vulnerability and represent failure,Broken shield icons in bold and outlined styles.Broken Shield icon - vector. Security Shield icon in flat style. Symbols of broken protection.
Collection of broken shield outline icons, representing concepts of security breach, vulnerability, and protection failure. Minimalistic linear pictograms suitable for web design, graphic design, app
Risk Icon Line and Black Fill Style Collection
Malware infection on document causing software security vulnerability concerns
Threat Detection icon sheet multi style collection
Illustration of two people, one holding a key and the other a tablet, near a secure vault.
Illustration of a person in a hoodie and mask typing on a keyboard in front of computer screens
Security Testing icon vector image. Can be used for Quality Assurance.
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Digital Guardian of the Web An Abstract Illustration Symbolizing Cybersecurity, Anonymous Protection, and the Enigmatic World of Online Data Networks
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Hacker in Black Hoodie and Mask Working on Computer.
Cybersecurity shield with lock and circuitry
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Data security and protection concept with shield and cube icons
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Training  Icon Element For Design
Unprotected Website Vector Icon
Website security vulnerability illustration showing software bug detection
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Cyber Risk Exposure Icon Set containing cyber hygiene, data sensitivity, threat landscape, regulation, vulnerabilities and third-party risk vector icons
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Cybersecurity threat icon set depicting a computer bug with an integrated circuit, representing malware, virus, software error, or system vulnerability
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Risk Icon
Large set of outline vector icons for cyber security, data protection, digital safety, insurance, and system vulnerability symbols.
Threat vector icon
Supply chain disruption management risk strategy vulnerability
Cybersecurity control room with analysts monitoring data on computers and security themed wall art
Cyber security and network defense line icon set. Vector pictograms of firewall, encryption, phishing, and vulnerability analysis, thin linear illustration.
Classic car under lightning storm isolated on white background, representing danger, power, and the vulnerability of vehicles to weather
broken padlock symbolizing a data breach, vector illustration for cybersecurity threat, information leak, and digital vulnerability
Vivid and dynamic cracked shield thin line icon, perfect for web, books, cards, and apps. This cartoon illustration features a stylized shield with a prominent crack, symbolizing vulnerability
“The forest listens to their breath.”
Risk Assessment White Icon Set Design
Training  Icon Element For Design
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Collection of security icons, representing safety measures, access control, and protection against threats and vulnerabilities
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Cracked shield symbolizing security threats and cyber vulnerabilities
HACCP icon set containing hazard, analysis, critical, control and points vector icons.
Delete your data with this vector trash can, a concept for data privacy and personal data security after a data breach in a vector graphic
Security assessment icon set multiple style collection
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Global supply chain disruptions impacting business operations and financial stability worldwide
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Threat vector icon
Ballot box icon, with cracks symbolizing security threats.
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Collection of minimalistic outline icons representing cracked shields and a radiator, symbolizing broken security, vulnerability, and potential damage. Ideal for web design, app interfaces, social
Set of 15 cracked shield icons in a linear style, representing broken security, vulnerability, or damage. These vector graphics are perfect for graphic design, web sites, cards, books, and articles
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Set of five cracked shield outline symbols, representing broken security, vulnerability, or failed protection. These versatile vector graphics are ideal for use in designs, books, advertisements, and
Cyber Attack White Icon Set Design
Cybersecurity threat modeling process flowchart diagram with risk assessment and attack vectors
Collection of cracked shield icons in a linear style, representing broken security, vulnerability, and loss of protection. These vector graphics are perfect for designs, books, adverts, and apps
Protecting vulnerability hands shielding a child near a toilet bowl
Risk Icon
Missiles labeled DDoS moving toward a laptop and a box symbolizing system vulnerability and data targeting. Ideal for cybersecurity, digital threats, data loss, hacking, online safety, IT security
Cybersecurity vulnerability concept with unlocked padlock and lightning bolt, highlighting potential security breaches and the importance of data protection
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Risk Assessment Icon
Hand-drawn black and white sandcastle is about to be destroyed by a giant crashing ocean wave in a dramatic sketch style illustration showing impermanence and vulnerability
Cybersecurity line icon set. Vector pictograms of mobile protection, user access, server, hacker, malware, data storage, and biometrics, thin linear illustration.
Broken chain link vector illustration set representing disconnection and vulnerability
Collection of fifteen cracked shield icons, hand-drawn in a white line art style on a black background, representing broken security, vulnerability, and damage, perfect for digital and print design
Threat vector icon
Emotional Icon Array. Emotional Expression Collection linear icon set: joy burst, sorrow drop, compassion flame, gratitude beam, vulnerability symbol, calm breeze, open gesture
Secure data storage concept with blocks and padlock illustration.
Set of 15 cracked shield icons, simple thin line art, perfect for websites, books, cards, and apps. Vector cartoon illustration representing broken security, vulnerability, and damage, isolated on a
Eye with Lock and Key - Online Surveillance Awareness and Privacy Caution.
Weaknesses icon set in line and glyph style on black and white background
Broken chain link illustration symbolizing weakness vulnerability or disconnection with clouds
Safeguard your data with robust cybersecurity solutions, ensuring comprehensive protection against online threats and vulnerabilities in a digital age of evolving risks
Risk Icon
Silhouette of a person curled up in a fetal position
Collection of ten cracked shield icons in a vector cartoon illustration style, presented on a black background, representing concepts of broken security, vulnerability, and failed protection, ideal
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Set of five cracked shield icons in a line, drawn with thin black lines on a white background, representing broken security, vulnerability, and failure. Simple vector cartoon illustration.
Fake W White Icon Set Design
Illustration portraying expressive eyes with tears conveying deep sadness and vulnerability
Set of seven linear vector shield icons with cracks, symbolizing broken security, vulnerability, or failure. These simple, clean line art illustrations on a white background are perfect for
Broken shield icons symbolizing security breach, failure, damage, and vulnerability protection
Collection of ten cracked shield line icons, representing broken security, vulnerability, and damage, suitable for websites, apps, and infographics, presented as a vector cartoon illustration on a
Code inspection - uncovers errors in programming scripts through red magnifying lens and warning alert triangle. Debugging for software developers in quality assurance workflows. Vector illustration
vulnerability icon set multi style various collection
Cartoon capybara illustration depicting sadness and emotional vulnerability in the rain
Young people helping erderly at the bus stop. Blind man with guide dog, old woman with a cane, elderly man in a wheelchair. Social helping concept. Vector illustration.
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Next page
/ 10