Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Print
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Weakness Outline Icon
Supply chain problem, risk vulnerability industrial business, connection management chain together into concept, fatigue businessman manager holding metal to chain together
Vulnerable Protect Concept: A stark visual representation of the contrasting concepts, where the vulnerability is juxtaposed with the necessity of protection, making a strong statement.
Exploit icon collection designed for web and mobile applications, featuring warning symbols, vulnerability indicators, and modern security graphics suitable for cybersecurity interfaces
vector icon of a document with a shield with a blue background in the shape of a shield
unprotected
Minimalist outline illustration of a fractured protective barrier depicting vulnerability and damage
Hands gently cradling a glowing globe representing our interconnected world
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Silhouette of a Hacker in a Hooded Sweatshirt Working on a Laptop Computer
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Emotional performance spotlight dancer curled inward under a soft circular light accent, expressing vulnerability and depth in contemporary choreography.
Risk management line outline icon
Cloud computing security icon set featuring binary code bug malware detection and monitoring eye symbol for software testing and vulnerability scanning
Melancholic mood: A sorrowful boy watching rain falling outside the window expressing his inner feelings and vulnerability with teardrops streaming
31 - 40
Computer Programing icon collection set. Containing performing, cpu, computing, integration, testing, analysis, generating, algorithms, hardware and debugging icon. Simple flat vector.
Cyber Defense web banner icon vector illustration with icons of Cyber Security,Cyber Attack,Cyber Defense,Hacker,Cybercrime,Vulnerability and Exploit
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Cybersecurity concept depicting a lock shield and hooded hacker figure
Software security vulnerability assessment using robots and professionals
Vulnerability Icon
Conceptual illustration of data transfer and cloud computing technology.
A striking silhouette depicts the stages of human life from infancy to old age showing growth and progression
A lone figure stands atop a submerged house representing loss and vulnerability in a flooded landscape silhouette high quality professional detailed
Open backdoor in a black wall cybersecurity concept illustration
A bird's nest with an egg inside viewed from directly above in a natural setting
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Black silhouette of a child holding a broken heart on a white background with a somber mood.
The key to safety enhancing cyber security protections
malware, cyber attack or virus line icon
Security lock states icons showing breach and open access with security protection cybersecurity violation unlocked vulnerability password encryption internet compromised authentication
Laptop computer with bug virus warning sign on screen representing malware infection cyber security threat software error and system vulnerability
Flat illustration of man managing cybersecurity for remote work telecommuting security
Sleek metallic shield icon with a glowing pixelated checkmark, symbolizing robust security, successful verification, and digital protection against threats and vulnerabilities in modern systems
Personal Protection Multiple Style Icon Design Vector - Hands shielding person representing personal safety, risk prevention, and human security support
Cyber Defense web banner icon vector illustration with icons of Cyber Security,Cyber Attack,Cyber Defense,Hacker,Cybercrime,Vulnerability and Exploit
Cybersecurity vulnerability scanner and risk assessment console icons
A stark black silhouette depicts a person lying prone on a hospital bed or gurney illustrating themes of illness rest or vulnerability silhouette
Advanced cybersecurity operations center dashboard interface with threat timeline, vulnerability scans and network defense analytics
Complex network of digital security shields under cyberattack, illustrating a critical breach in modern data defense systems and online protection vulnerability
A futuristic digital dashboard displaying various warning signs and charts on a dark background with a collection of papers
Risk Icon
Vulnerability search. SEO optimization,web analytics, programmin
Virus Icon Set Multiple Style Collection
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Black and white illustration of broken chains padlock and shattering links representing security breaches and vulnerabilities
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Exposed and Secure: A visual representation of contrasting states with bold, clean typography, highlighting the concepts of vulnerability and protection in a modern design.
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Broken chain link icon set illustrating weakness, disconnection, or freedom in various styles
Cybercrime & Data Breach: Hacker on Laptop Stealing Personal Information & Financial Data. Digital Security Threat & Identity Theft Concept.
A distressed swimmer waves for help as they reach for a lifebuoy floating nearby, illustrating the urgency and vulnerability of human life in an unpredictable ocean environment.
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Vulnerability text with decimal number background
*Stamp11
Cyber Defense web banner icon vector illustration with icons of Cyber Security,Cyber Attack,Cyber Defense,Hacker,Cybercrime,Vulnerability and Exploit
Vulnerability assessment and risk analytics icon set with vulnerability
人物
Padlock silhouette set, four black padlocks with one broken and cracking open symbolizing security breach vulnerability and access concepts.
A pair of black hands depicted in a cupping gesture against a white background
Software bug tracking and vulnerability scanning icons showing browser window with target crosshair and beetle insect for web security testing
Cybersecurity, targeted advertising, product branding, digital safety, content placeholders, corporate presentations. Trojan horse, text blocks and bottle elements. Cybersecurity and targeted
Supply chain problem, risk vulnerability industrial business, connection management chain together into concept, fatigue businessman manager holding metal to chain together
Broken chain link graphic with burst effect striking black silhouette
Cyber security automated patch management updating vulnerable outdated files to latest version for software security optimization and risk mitigation in corporate IT infrastructure
A solitary figure stands on a precipice contemplating the vast unknown expanse ahead
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Icons representing cybersecurity and hardware vulnerabilities with temperature indicator
Worn-out face mask on a smartphone screen, symbolizing vulnerability and technology's role
Cybersecurity icons a collection of digital protection and network security symbols
Digital Shield Security Technology Circuit Board Icon.
Secure and unsecure heart-shaped padlocks symbolizing data protection and vulnerability
Geometric bear, pink gold polygonal, vulnerability concept, business illustration
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Cloud Computing Security and User Access Management Diagram.
Cyber Defense web banner icon vector illustration with icons of Cyber Security,Cyber Attack,Cyber Defense,Hacker,Cybercrime,Vulnerability and Exploit
Secure and insecure printer icons representing data protection and vulnerability
Comprehensive security and data privacy icon set featuring vulnerability assessment, robust protection, certified verification, and user identity investigation for digital safety
A stark black shield illustration features a prominent cracked design symbolizing damage or vulnerability high quality
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Secure Code: Two gold padlocks symbolize security and access, one locked with a coded key and the other unlocked, representing either protection or vulnerability
Cybersecurity breaches, malware, coding, software vulnerabilities, hacking prevention, online protection. Developer writing code, bug and Trojan horse symbols. Cybersecurity and malware ion
A progression of hearts from solid to fragmented to outline illustrating emotional stages and vulnerability
Risk Assessment Icon
Cracked house icon representing property damage, family separation, or structural vulnerability
Emotional vulnerability illustrated by a person with subtle cracks along their body, tiny floating shards and stars conveying introspection, fragile strength,
Emotional vow reading bride wiping a joyful tear while holding a small vow booklet as the partner listens attentively, expressing sincerity and vulnerability
Shield Icon With Crossed Diagonal Line Depicting Vulnerability And Defenselessness
Conceptual line art of a broken house enclosed within a transparent box symbolizing vulnerability
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
Emotional illustration of a terrified woman sitting on the ground as a giant dark wolf or dog leaps and barks aggressively.
vulnerability icon
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Leadership vulnerability honest leadership moment where a team leader stands beside a small group while a speech bubble with a heart icon suggests openness and
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Next page
/ 10