Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Vulnerability Assessment Icons. Isometric Flat icon set of vulnerability assessment activities: vulnerability scanner, CVE
unlocked computer access icon sign vector
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Cyber attack and security threat concept. Hand holding phone with error message, virus warning, and spam alert. Hacking, network failure, data breach, malware, phishing danger vector.
Risk Icon
Penetration Testing Icon
Cyber Threat Icon
Crying child with teddy bear sits amidst rubble, expressing deep emotion in a minimalistic setting, evoking feelings of loss and vulnerability with copy space
Hand holding fishing rod with password bait, heart with heartbeat monitor, online search interface. Ideal for cybersecurity, data protection, phishing awareness, privacy, online health, digital
Emotional Vulnerability Icon
Broken shield icon vector outline set illustration sign
Risk Vector Design Icon Style
Collection of shield icons, representing protection and security.  Various states of the shield, from intact to broken, symbolize vulnerability and resilience.
Cyber Threat Icon
Vulnerability Management Icons. Solid, Filled icon set of vulnerability management: vulnerability scanner, patch rollout truck,
Vulnerability Icon
Disruption Icon
Cartoon vector illustration of a sad woman sitting with knees drawn up, symbolizing emotional exhaustion and vulnerability against dark background
Cyber Attack Solid Black Icon
Protection and Security Concept
Risk Icon
fishing identity theft icon sign vector
Cybersecurity Icon Set. Solid, filled icon set of proactive cybersecurity measures: penetration test, vulnerability scan, security
Various icons representing different human emotions and mental states depicted in a simple, monochromatic style for educational purposes
Security Testing Icon
Rhino in Sepia: A powerful rhino stands boldly in its natural habitat, rendered in a sepia tone, against an illustrative background that captures the essence of the wild.
Vulnerability Icon
Hacker in a mask
Lock and skull signifying cyber threats, gear symbolizing system operations. Ideal for security, hacking, IT systems, network protection, software vulnerabilities, data breaches, simple landing page
Login Password Laptop Composition
Failure Mode Outline Icon
Security shield icon set with lock star checkmark bolt broken and keyhole featuring black and white symbols
Security pursuit showing a thief running away with a password being chased by a policeman, illustrating data protection and cybersecurity.
System Vulnerability Icon
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Vulnerability Icon
Disruption Icon
Cartoon vector illustration of a sad woman sitting with knees drawn up, symbolizing emotional exhaustion and vulnerability
Hacker Solid Black Icon
Misconfiguration Icon Lineal Syle
Exploit Icon
A broken chain link symbolizes a compromised connection or security breach.
Supply Chain Risk Icon
 risk
Collection of hand drawn doodle icons representing cybersecurity and data protection concepts silhouette isolated on white background
Vector Detailed cracks and fissures in black and white.
Decryption Icon
Recognizing elder abuse, physical, psychological, economic, and environmental signs
Hacker trying to break into a website security system with skull
Unlocked lock illustration representing vulnerability and security in a colorful design
Silhouette of children working with tools for world day against child labor illustration art
Child sitting on floating refrigerator in flood, hugging dog with sad expression, surrounded by rising water and distant houses, conveying a sense of loss and vulnerability
Broken shield icon black and white vector sign
Cyber Threat Icon
Security Pipeline Icons. Isometric Flat icon set of security in deployment pipeline: static code analysis, vulnerability scan,
Data Breach Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Risk Icon
Security Breach Icon
vector icon of a document with a shield with a blue background in the shape of a shield
Risk Icon
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Vulnerability Icon
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Bug fixing doodle for improve website performance
The Importance of Empathy and Active Listening in Effective Communication Within Relationships
Vulnerability Icon
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Man holding smartphone surrounded by warning alerts, phishing scam messages, suspicious calls, cyber threat notifications, online security risks, digital danger concept
Risk Icon
Hooded Programmer Analyzing Code On Computer Screen For Cybersecurity Solution
Bug Icon
Shattered Glass Silhouettes: Nine Broken Circle Patterns, Black & White
Zero Day Icon
Vulnerability Management Icons. Solid, Filled icon set of vulnerability management: vulnerability scanner, patch rollout truck,
Vulnerability Icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Set line icons of risk management isolated on white
hacker logo. vector. editable.
Understanding cyber security hacker attack and data protection with cloud security concept icon set editable stock vector illustration
Exploit Icon
Cyber Security Icon Set Featuring Protection, Shield, Data, Encryption, and Firewall Concepts in a Professional, Clean, and SEO-Optimized Vector Style
Silent Contemplation: A silhouette of a woman deep in thought, captured in a moment of introspection, her posture revealing vulnerability and the weight of contemplation.
DAST blue gradient concept icon. Dynamical analysis, web application. Security testing. Round shape line illustration. Abstract idea. Graphic design. Easy to use in infographic, presentation
Flat Illustration Business Team Meeting, Project Planning, Data Analysis, and Strategic Collaboration
Symbolic representation of vulnerability and growth in a minimalist design
Threat Icon
A distressed man holding a heart symbol in his chest, expressing sadness and emotion in a flat vector illustration, showcasing vulnerability and human feelings in a poignant scene
System Vulnerability Icon
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Protection background. Technology security, encode and decrypt, techno scheme
security scan icon sign vector
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Cyber Threat Icon
Vulnerability Methods Icons. Pixel art icon set of vulnerability assessment methods: CVE database, risk matrix, asset inventory,
Data Breach Icon
network global security icon with shield
Cybersecurity Threat Fixer: Software Vulnerability Repair And Patching Implementation
Cybersecurity Specialist Reviewing Code For Security Vulnerabilities And Threats
Next page
/ 10