Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Threat Assessment Icon
Security Testing Icon
Print
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Shield containing a bug, symbolizing security and protection against threats and vulnerabilities online
Emotionally typing on phone while in tears, expressing vulnerability
Artistic representation of a hand touching a fractured heart symbolizing vulnerability and emotions
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Achilles' Heel
Certified Ethical Hacker - CEH - icon set & web header banner
Risk management process, business vector concept
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Though the armor may seem to protect it also serves as a barrier keeping others at arms length and shielding the vulnerability within.. Vector illustration
Cyber security breach concept. Hacker stealing confidential information and personal data. Computer crime, malware, phishing attack, and digital privacy risk. Network security alert.
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Woman wiping tears while sitting on a couch, emotional vulnerability
Digital Security: Hand-drawn shields represent digital security and protection. Each element symbolizes a lock, a checkmark for confirmation, and a shield symbolizing protection.
A woman expressing discomfort while holding her hands to her face in a minimal vector illustration showcasing emotional vulnerability and warmth in a cozy setting vector art
Alert and security technology research or find bug concept
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Risk Management Hazard Line Editable Icons set. Vector illustration in thin line modern style of warning, danger, security, protection. Editable stroke. Vector illustration
脆弱性診断のアイコン
Vulnerability Assessment Icon
Security Testing Icon
Kneeling stick figure in a pose of vulnerability or prayer. The simple black silhouette against a plain background evokes feelings of contemplation and introspection
Data theft cybersecurity concept. Hacker stealing personal information. Online crime, privacy breach, confidential data stolen. Password security, identity theft, digital protection vector.
Elderly hands expressing vulnerability in gentle pose, human connection
Penetration Testing Icon
Solid style icons of penetration testing tools: test probe, red team icon, simulated attack, pen test report, vulnerability exploit icon, access attempt, breach simulation, ethical hacker badge.
Cyber security threat hacker attack data breach online fraud internet crime phishing scam ransomware vulnerability editable stock vector illustration
Cybersecurity Risk Icon
Cracked padlock icon digital security breach vulnerability
Vulnerability Icon
A cheerful rainbow smiles amidst menacing dark clouds, with falling nails symbolizing vulnerability and resilience.
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Symbolic broken mask and colorful brain, vulnerability and healing
Line style icons of cybersecurity tools: antivirus software icon, network scanner, encryption key, security audit file, vulnerability scan icon, ethical hacker badge, incident response kit, keylogger
A bank conducting regular vulnerability assessments and tration testing to identify and address potential system weaknesses.. Vector illustration
Line style icons of emotions and moods: sad face in circle, tear with calm expression, cloudy mood icon, low energy symbol, quiet grief badge, soft vulnerability ring, blue feeling symbol, emotional
Risk Icon
A cracked shield symbolizes compromised protection.
Bait hacking icons set. Various cyber security threats, phishing scams, and online vulnerabilities endangering user data and privacy
Security Icon Set. Outline icon set of security scanning pipeline: shield emblem, vulnerability magnifier, lock icon, scan
Flat vector icons of cybersecurity analytics: network threat monitoring badge, vulnerability scanning dashboard medal, cybersecurity incident report trophy, risk assessment analysis ribbon, system
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Couple with tissue box, silhouette of emotional support and vulnerability
Elderly hands expressing vulnerability in gentle pose, human connection
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
A boy is lying asleep on a chair or bench by the sea, surrounded by the peaceful sound of waves. Above him, a robot gently watches over or protects him, creating a touching contrast between human vuln
Silhouette of man trapped in spiderweb. Detailed image shows man's silhouette caught in intricate spiderweb design.  This striking silhouette concept is perfect for illustrating vulnerability
Insider Threat Icon
Cracked padlock icon digital security breach vulnerability
Security Icon
Security Testing Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Risk Glyph Icon
Vulnerability Line Gradient Circle Background Icon
A broken lock with a red danger sign on top indicating the vulnerability of personal data if not properly secured.. Vector illustration
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Penetration Testing Icon
Multiple sclerosis icons outline key concepts like damaged nerves, signal loss, and impaired navigation for MS awareness. Outline icons set
A beetle on a microchip represents software bugs and computer vulnerabilities
Security Icon Set. Outline icon set of security scanning pipeline: shield emblem, vulnerability magnifier, lock icon, scan
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Silhouette of person trapped in cage with illicit trafficking text on white background graphic design
malware, cyber attack or virus line icon
Vulnerability Icon
Cybersecurity Risk Icon
Website Vulnerability Scanner Icon
Illustration concept of a virus-infected computer.
Cybersecurity Risk Icon
Line style icons of cybersecurity and privacy: penetration test icon, ethical hacking badge, vulnerability probe screen, system test layout, attack simulation panel, result findings card, test report
Security shield with heart and padlock in minimal style
Security Testing Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Network and data security icons highlighting system vulnerabilities
Upset young man leaning against wall, expressing vulnerability
Circle of Support A circle of diverse team members holding hands around a leader emphasizing community and strength that comes from showing vulnerability together.
Flat vector icons of secure software development: DevSecOps pipeline icon, secure coding shield, vulnerability scanner badge, code review checklist, secure deployment cloud, penetration test report,
Cyber threat Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Security patch icon for software vulnerability fix
Vulnerability Management Icons. Isometric Flat icon set of vulnerability scanning and management: scanner console, CVE database,
Penetration Testing Icon
Majestic Orangutan A Stunning Illustration of an Endangered Primate, showcasing the beauty and vulnerability of this incredible creature
Threat Detection multiple icon
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Risk Icon
Ocean acidification process.chemical equation and consequences
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Cybersecurity Risk Icon
Line style icons of cybersecurity and privacy: security update icon, patch installation badge, auto update screen, system fix timeline, vulnerability log panel, critical fix alert, version control
Exploit Icon
Security Testing Icon
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Cyber Threat Icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Next page
/ 10