Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
The key to safety enhancing cyber security protections
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Data Risk Glyph Icon
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Zero Day Exploit Icon
Antivirus linear icon. Contains such icons as cloud, information, vpn, virus, smart, shield, vulnerability and more. Pixel perfect. Minimalist editable vector stroke.
computer cyber security icon sign vector
Learning about self, A figure stands atop an oversized hand, showcasing a harmonious blend of strength and vulnerability, inner work concept
Exploitation Icon
Illustration of a man using a laptop with an unlocked password, signifying data security issues Consider using it for cybersecurity or data protection concepts.
Vulnerability Icon
Cyber scanner Icon
Laptop with lock, hacked login screen, cloud server, binary code, email vulnerability, and user data visualization. Ideal for digital security, hacking, data breaches privacy cybercrime system
System Vulnerability Icon
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
Emotional Vulnerability Icon
Vulnerability Icon
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Graphic showing phishing danger with login fields for users, emphasizing online security awareness.
Locked Cloud with Padlock Icon for Cybersecurity Data Privacy and Protection
The key to safety enhancing cyber security protections
Information security analyst icons outline key concepts like surveillance, access control, and data protection, transparent background. Outline icons set
Failure Vector  Or Logo Sign Symbol Illustration
system hacked alert after cyber attack on computer network compromised information concept internet virus cyber security and cybercrime
Zero Day Exploit Icon
Antivirus linear icon. Contains such icons as cloud, information, vpn, virus, smart, shield, vulnerability and more. Pixel perfect. Minimalist editable vector stroke.
website hack attack icon sign vector
Broken crystal ball with a star shaped crack, symbolizing failed predictions, unexpected events, and the inherent risks of fortune telling
Hacker Icon: Cybersecurity Threat and Data Protection in Digital World
Computer Programing icon set with performing, cpu, computing, integration, testing, analysis, generating, algorithms, hardware and  debugging
Bankruptcy Risk Icon
Risk Icon
Geometric Trojan horse on wheels beside a web window with user icons under a cloud. Ideal for cybersecurity, data breaches, hacking, cloud risks, malware, internet safety, abstract line flat metaphor
Browser Coding Icon Vector Element
Unsecure server Icon
Analytics dashboard for security metrics, threat analysis, risk management, cybersecurity intelligence, data protection, compliance tracking, vulnerability assessment, security monitoring.
Risk Icon
Illustration of a depressed elderly man sitting in a wheelchair, isolated
These illustrations can help convey the message about how vulnerability in leadership creates authentic relationships and trust a team members.
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
The key to safety enhancing cyber security protections
little girl fear black and white line art drawing ink sketch nature landscape vector hand drawn illustration background, beyond fear: finding strength in vulnerability
a young man sat with his knees bent and his head bowed in depression pixelate grayscale color halftone dotted texture style collage element isolated on blue background
A young boy feeling upset while being surrounded by pointing hands expressing blame and judgment
Ethical Hacking Icon
Depressed Crying Man feel Sad
phone virus hack icon sign vector
Risk Assessment Icon
Patch Outline Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Vulnerability Icon
A lone astronaut, helmet visor shattered, floats weightlessly in the inky black of space, stars twinkling distantly.  The scene evokes vulnerability and isolation.
AI-generated phishing emails use automation and machine learning to craft deceptive messages. Cybersecurity threats, email scams and fraud detection are key in preventing AI-driven phishing attacks
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Unsecure server Icon
Analytics dashboard for security metrics, threat analysis, risk management, cybersecurity intelligence, data protection, compliance tracking, vulnerability assessment, security monitoring.
Security Patch Glyph Icon Design
Black Safe Box Icon for Data Security and Cybersecurity
Between the pages hidden gems of creativity and vulnerability a friendship that sparks inspiration and catharsis.. Vector illustration
Transparent glass dome with star shaped crack, symbolizing a security breach or vulnerability
The key to safety enhancing cyber security protections
Cyber Attack Illustration with Hacker and Bugs Shows a hacker deploying bugs or malware to exploit system vulnerabilities.
Zero Day Multistyle Icon Set
A warning sign indicating a data breach, featuring an exclamation mark and bold text highlighting the term "DATA BREACH.
Zero Day Exploit Icon
Neon half tone shield representing vulnerability in digital world with glowing lines
document security icon sign vector
Broken shield icon Flat vector set outline
Intrusion Outline Color Icon
Depict a visual narrative showcasing the complex interplay of trust and betrayal, exploring themes of vulnerability and deception through human relationships.
Bankruptcy Risk Icon
Automation Security icon. Automated Threat Detection, Phishing Filter Guard, AI Security Monitoring, Intrusion Prevention and Vulnerability Assessment
Person in despair looking for answers, solutions concept.  Hand drawn doodle vector illustration
Breach
Hidden Emotions: A sketch capturing the vulnerability of a person concealing their face with their hands, conveying a sense of introspection and hidden feelings.
Shy young man blushing and looking away in urban setting, vulnerability
Vintage-style illustration of a human heart being held in an open hand, symbolizing care, compassion, or vulnerability. Black and white woodcut art with intricate details. Isolated, cut out
A black bolt with a red glitch streak icon representing cybersecurity, data breaches, and digital threats. Ideal for security themes and vulnerability concepts.
Security Audit A figure dressed in security gear inspecting a server room with highlighted components showing vulnerabilities representing the importance of audits in
Man experiencing throat pain with a distressed expression on a white background for concept
The key to safety enhancing cyber security protections
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Zero Day Multistyle Icon Set
Little Child, hidden domestic violence. 
Little girl grunge silhouette with hand print on the face and with taped mouth. Vector available.
Zero Day Exploit Icon
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
hacker logo. vector. editable.
Security Testing Icon
Supply Chain Attack Icon Black Style
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Weakness Icon
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Man lying on floor in despair isolared doodle.  Hand drawn vector illustration
Breach
Anxiety and Fear: Capturing the intense emotion of a young woman experiencing anxiety and fear, this image evokes feelings of vulnerability and distress.
Hacker use KRACK method for steal important data with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
Hacker activity icon set collection. Simple line vector.
1049 - Risk Concept Illustration
Next page
/ 10