Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Compliance icon set black and white
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Weaknesses icon set , Broken chain link with jagged edges icons. Link chain icon flat illustration set logo
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple line vector
Cybersecurity intelligence line icons collection. Threats, Breaches, Hacks, Malware, Vulnerabilities, Pentesting, Encryption vector and linear illustration. Firewalls,Intrusion,Phishing outline signs
Digital lock protect data flow in global network
Risk
 risk
Training icon set multiple style collection
Weak Point icon set multiple style collection
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
Protection simple icon set. Set of line pictogram. Privacy icon set. Contain linear sign cyber, antivirus, safe, safety, software and more.
Virus on laptop, malware or network vulnerability vector
Abstract Figures Silhouettes Sleeping Poses resting
Cyber Security Icons Set Shield Protection Data Network.
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Supply Chain Risk Icon
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Social volunteering or social care concept. With three illustrations of social workers helping elderly and disabled people. Flat vector illustration
Vulnerability text with decimal number background
Compliance icon set black and white
Vulnerability search. SEO optimization,web analytics, programmin
Weaknesses icon set , Broken chain link with jagged edges icons. Link chain icon flat illustration set logo
Protección de las personas mayores o tercera edad.
Root Cause Icon Element For Design
Cybersecurity and protection icons set – linear, outline, security and safety symbols
Hacker with laptop vector icon anonymous person in hoodie concept for cyber security and data theft
Sign of Meltdown and spectre vulnerability on notebook monitor
Shopping basket next to warning triangle and bug icon highlights cybersecurity risks in online shopping. Ideal for e-commerce security, warning, technology, software vulnerabilities, online safety
Set of Engraving Designs Featuring a Young Man Staring into a Mirror with Doubt – Symbolic Art of Self-Reflection, Identity, and Inner Struggle – Detailed Line work for Creative Projects young man
A distressed woman isolated and sad within a clear glass dome, symbolizing loneliness, anxiety, and mental health challenges, with an observer nearby.
Stylized broken dna strand depicting genetic mutation and health science
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Bug fixing doodle for improve website performance
Vulnerability Icons
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Firewall Breach Network Intrusion Unauthorized Access Data Leak Security Vulnerability Minimal Icon Set
A close up portrait of a young person with scars on their face looking worried and distressed surrounded by tropical leaves
A series of silhouettes depicting a person overwhelmed with distress and pain
Threat Detection icon set black and white
Risk Icon
Exploit Multistyle Icon Set
Abstract Silhouette of a Tent with Cracked Ground.
digital security concept with firewall and shield representing protection of information systems
Leadership Vulnerability Icons. Leadership vulnerability. Line icon set of leadership vulnerability: heart, shield, open hand, human head, speech bubble,
Abstract Digital Spider Web Mesh Pattern on Dark Background, Technology Network Concept
Cybersecurity Threats Icons Set: Illustrating Common Digital Dangers Like Malware, Phishing, and Data Breaches Through Clear, Modern Outline Graphics
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Soldier in gas mask with wide fearful eyes, reflecting red flash of nuclear detonation in lenses, surrounded by ominous smoke and chaotic atmosphere, depicting intense wartime emotions
Breach Solid color and black line drawing vector illustration set
Spam link detected on computer web. Dangerous link concept.
Broken shield icon concept of vulnerability and risk. Cracked guard symbol of failed security, data breach or damage. Metaphor for weakness, unprotected system failure.
Password Cracking Icon Collection With Multiple Styles
Failure Mode Outline Icon
Illustration of a bank-like building with a keyhole and a warning sign, symbolizing a security vulnerability or data breach risk.
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Security and privacy icons including fingerprint and warning signs
Risk Assessment Icon Element For Design
Cyber Intelligence icon set black and white
Continuous one line of a lightbulb glowing faintly inside shattered glass, sleek minimal fragile hope symbolism design, hand drawn vector illustration.
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Secure Coding Icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
vector banner of cyber resilience framework featuring layered security elements ideal for technology blogs training content strategy documents info-graphic layouts professional consulting visuals
Heart Padlock Logo Variations. Set Logo of Vulnerability Symbols: Unlocked Padlock with Heart. Logo set in vector style, emblematic variations. line, bold
Illustration of a broken chain link symbolizing weakness or vulnerability.
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Team building icon set with Teamwork, Trust, Motivation, Problem Solving, Team Building.
Weaknesses icon set , Broken chain link with jagged edges icons. Link chain icon flat illustration set logo
Cyber crime and hacker attack concept demonstrating hackers stealing sensitive data using technology in a digital environment
Stylized white line art illustration of a human hand reaching out from a dark black background, concept of seeking or emergence.
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Open backdoor in a black wall cybersecurity concept illustration
Risk Assessment Icon Banner Line Art
Market Data Icon  in black line style icon, style isolated on white background
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
Securing Digital Assets Cloud Data Protection and Cybersecurity
Threat Mitigation icon set black and white
Continuous one line of a single balloon floating above a ruined cityscape, elegant minimal resilience amidst despair symbolism art, hand drawn vector illustration.
risk analysis icon collection set. Containing Assessment, Mitigation, Hazard, Vulnerability, Impact, Probability icon
Network Security Icon
Collection of black chain link icons representing connection, disconnection, strength, and weakness in a minimalist vector style with whole, broken, and circular variations
Blue shield padlock for digital security and data protection
security scan icon sign vector
Sharp, graphic cracks with jagged edges illustrate concepts of damage, fracture, and the ultimate breaking point, creating a dramatic visual metaphor for stress and instability
Incident Multistyle Icon Set
Black chain breaking apart with explosive force and fragments flying
Stages of a cyberattack onboarding mobile app screen. Access control. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI. Montserrat SemiBold, Regular fonts used
Security checklist and shield icon representing data protection and policy compliance
Broken chain link represents vulnerability and disconnection in a simple black and white design  vector silhouette
Three hooded figures working on laptops in a dark digital environment
A vibrant blue shield with a checkmark symbol representing security and protection
Superheroes tending to their fallen comrade in a moment of solemn reflection
Powerful symbolic art capturing emotional depth, tears transforming into precious gems symbolizing resilience and inner value
Cyber Security Icon In Black And White Line Style
Weaknesses icon set , Broken chain link with jagged edges icons. Link chain icon flat illustration set logo
3D Isometric Flat Vector Illustration of Mulnerability Testing, Teamwork And Data Management For Cyber Threats With Digital Security Solutions
Next page
/ 10