Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Risk  Outline Icon
Cyber threat Icon
AI cybersecurity risks and machine learning vulnerabilities in digital security. AI security threats, data breaches, hacking risks and advanced protection strategies. Cybersecurity vector illustration
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Code Legacy  Icon Set Multiple Style Collection
Vulnerability Assessment Icon
Cyber Risks Icon Style
computer protection icon sign vector
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Sad depressed woman in despair and grief mood, sitting curled up, hugging knees. Frustrated desperate upset female, overwhelmed by sorrow. Flat vector illustration isolated on white background
Cybersecurity Vector Icon Set | data protection, malware, phishing, email threat, firewall, secure server, hacking alert, cloud security, virus warning, encryption, software bug, password lock
Threat Icon
Security Breach
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Vector isometric digital illustration of a cybersecurity concept, highlighting advanced technology, data protection, and network security in a futuristic digital environment.
Cyber Attack Line Icon Sheet
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
shield X glyph icon
Cybersecurity Risk Icon
Bug Icon – Software Error, Debugging, Malware Detection, IT Security Symbol
Penetration Testing Icon
password fraud icon sign vector
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
Hacker activity icon set collection. Simple line vector.
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Security Risks Icon Style
security antivirus check mark icon sign vector
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Threat Icon
Risk Management Framework icon set in Mixed style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Risk Flat Icon
Penetration Testing Icon
AI technology in security set. Characters using artificial intelligence, algorithms, generative tools for data protection, cybersecurity, privacy, hacking threats prevention. Vector illustration.
network warning glyph icon
Cybersecurity Risk Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Penetration Testing Icon
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Honeypot Icon
Security scan Icon
A smartphone displays a shield symbol, emphasizing security features designed to protect user data online Phone with security features, illustrated in a flat style.
Risk Factors Icon
security assurance icon sign vector
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple flat vector illustration.
Threat Icon
Cybersecurity consulting service gradient header information consultant professional solution for company information technology cyber security
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
The program offers a safe space for individuals to share their vulnerabilities and receive understanding and validation from their peers.. Vector illustration
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Broken shield icon Simple thin outline
Insider Threat Icon
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
Risk Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
data and document protection
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Security warning shield indicating a potential threat or vulnerability
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
cyber security icon sign vector
Flat illustration One man coughed and sneezed continuously because the dust and smoke were damaging his lungs.
Weakness Outline Icon
Threat Icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
A comprehensive set of icons illustrating various aspects of cyber attacks, including threats, defenses, and security measures.
 risk
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Risk Icon
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Threat Intelligence Icon Lineal Blue Style
Insider Threat Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Cyber scanner Icon
Exploit Icon
Supply Chain Risk Icon
vulnerability line icon
Risk Icon
Security Patch icon
Illustration of a man using a laptop with an unlocked password, signifying data security issues Consider using it for cybersecurity or data protection concepts.
Vulnerability Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Failure Mode Outline Icon
Threat Icon
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
Insecure Icon
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
virus in mail icon sign vector
Next page
/ 10