Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Digital Shield: Protecting Your Data in the Cyber World. Secure Network, Data Privacy, Cyber
Honeypot Icon
Hacker in the Shadows: An anonymous figure in a hooded sweatshirt intensely focused on a computer, symbolizing cybersecurity threats and digital crime in the digital realm.
Camping Bundle. Refugees Camp Survival Collection Illustrations
Risk Icon
Fragmented black and white of a figure against a textured background.
mortality death life aging icons set vector
 Comprehensive Vulnerability Scanner Icon
shield X line icon
Cybersecurity threat concept. Hacker phishing for sensitive data from server. Data breach and cybercrime illustration. Security vulnerability, malware attack, and internet fraud.
A woman trapped within a complex, chaotic web of tangled threads symbolizing deceit and lies.  Her expression conveys vulnerability and despair.
Sad boy crying holding teddy bear in yellow shirt vector illustration
Brute force attack icon, hammer and keyhole symbol. Exploiting security vulnerability graphic, system penetration or data breach tool illustration for cybersecurity.
Vector outline unlocked padlock icon representing security vulnerabilities
Risk Assessment Icon
Threat Icon
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Trapped and Needing Help
Risk Vector Design Icon Style
Criminal Assault Threat Icon
Alert message interface indicating a potential system problem, requesting user awareness and prompt action to safeguard against further implications
Eavesdropping Icon
Shattered self-image. Broken mirror reflecting a fractured male face. Concept of identity crisis, mental turmoil, psychological distress, inner conflict, and despair. Hand holding mirror illustration.
Threat icon
Risk Icon Outline Style. Vector Illustration For Graphic Design
Vulnerability Icon
Cars and Floods – Vector graphic of flooded city cars, highlighting environmental risks, storm effects, and transportation vulnerability due to rising water levels.
Exposure Icon
Disempowerment Glyph Blue Grey Icon
Risk Management Icon
People Securing Online Data Shields, Locks, and Key on Digital Screen Illustration
A darkhaired man embracing a blonde tearful child suggesting comfort or consolation
Compromised shield icon, security failure or data breach symbol. Broken protection and system vulnerability graphic, unsuccessful defense or attack illustration.
A futuristic AI-powered cybersecurity system detects and neutralizes a sophisticated cyberattack, visualized with glowing nodes and data streams.
A minimalist sketch of a figure sitting in a posture of sadness and isolation.
Risk Icon
mortality death life aging icons set vector
The Impact of Cyberbullying
Cybersecurity vulnerability concept. Shocked woman fears data breach as broken padlock symbolizes hacked system. Internet security failure, online protection risk, unauthorized access alert.
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Firewall Breach Vector Illustration Concept of Network Security Attack
Data Breach Icon
QR code and tag on a smartphone beside a geometric Trojan horse and metadata tag. Ideal for cybersecurity, data encryption, digital banking, vulnerability awareness, digital threats, online payments
Elderly man with trembling hands, his wrinkled face reflecting wisdom of years and touching vulnerability of aging.
Distressed figure in monochrome with flowing paint, conveying vulnerability
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Businessman using hypnosis with pendulum to influence employee. Vector concept of corporate manipulation, mind control, persuasion, suggestion, trance, compliance, and workplace power dynamics.
Vulnerability Assessment Icon
Penetration Testing Icon
Earth in Distress cry
Cybersecurity Process: A visual representation of a circular process highlighting key elements of cybersecurity, including enhanced privacy, user control, secure management, and reduced risk.
Man in Crosshairs Target Audience Risk or Targeted Marketing Concept
A woman wearing a distressed expression visibly displays emotional pain, showcasing her deep vulnerability and turmoil
Camping Bundle. Refugee Camp Tents Collection Illustrations
Vulnerability Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple color vector
mortality death life aging icons set vector
Adult Aggression and Child Vulnerability
Risk icon vector image. Can be used for Compilance and Regulation.
Unsafe Icon
Flat vector illustration of a pirate hacker launching a cyber attack with malware bugs and viruses against an AI processor chip, depicting cybersecurity threats and system vulnerabilities.
Exploit Icon
Security analysis or risk assessment, vulnerability assessment or threat detection, security audit or compliance check, data protection or encryption evaluation, network security or perimeter defense,
Elderly man with trembling hands, his wrinkled face reflecting wisdom of years and touching vulnerability of aging.
Exploit Icon
Cybersecurity breach concept. Hacker stealing confidential documents and data from a laptop. Cybercrime vector illustration with a broken lock, warning sign, and internet thief. Security risk.
Minimalist Line Art of a Precarious House on Shifting Sands in 2
Smartphone security vector concept featuring shield and padlock icons protecting device from hacker attacks and virus malware threats. Mobile cybersecurity and data privacy illustration.
Shield Slash Solid Icon
A black outlined triangle encloses an exclamation point on a white background, expressing warning
Network vulnerability highlighted by bug icon and computer screens
A hooded figure hunched over a glowing laptop in a dimly lit room, intensely focused on breaching a firewall, digital code cascading across the screen.
Hacker at computer, cybersecurity threat concept. Vector illustration of data breach, phishing, internet crime, and malware. Digital security, privacy protection, and network safety.
Camping Bundle. Apocalyptic City Destruction Collection Stickers
Online scam alert. Distressed man victim of cybersecurity threat, hacker on smartphone. Phishing, malware bug, data theft. Internet fraud, digital vulnerability, online safety, tech support concept.
51 Attack Blue Icon
Vector outline broken padlock icon representing security risks and vulnerabilities
Parental Conflict and Child Impact
Cyber security concept of a phishing attack. Hacker stealing sensitive data and passwords from a computer. Data breach, internet fraud, identity theft, malware, and privacy risk vector.
Data Leak Icon
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Botnet Icon
Cybersecurity vulnerability concept with shocked woman and broken padlock. Data breach, hacker attack, and system error. Internet security failure, privacy threat, and digital protection compromised.
Conceptual Vector Illustration of a Person Trapped by Harsh Criticism and Negative Feedback, Symbolizing Emotional Struggle and Mental Pressure in Modern Life
Online security icons set – silhouette, protection and privacy symbols for safety
Patching Icon
Vulnerability Icon
Patch Icon
Hardening Icon
Exploit Icon
50 cybersecurity icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Vulnerability Icon
Childhood Fears and Nightmares
Bullying and Distress
Depressed Woman with Trauma from Bullying
ear and Nightmares
Online Manipulation and Social Engineering
Cyber attack and data breach concept. Hacker stealing confidential information from laptop. Cybersecurity threat, phishing, identity theft, privacy violation and online fraud.
Camping Journey. A Bundle of Resilience and Hope Collection Illustrations
Cybersecurity concept for cloud computing security. Data protection and information privacy vector banner. Network firewall, antivirus, encryption, and malware detection illustration.
Next page
/ 10