Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Cybersecurity icon set. Includes cybersecurity, security, firewall, encryption, malware and More. Editable Stroke Icon Collection.
A businessman unlocking a large padlock with a giant key, symbolizing security and access control.
Protección de las personas mayores o tercera edad.
Sharp USB drive piercing and dripping with dark liquid, symbolizing digital danger or intrusion
Cyber Security Icons Set Shield Protection Data Network.
Supply Chain Risk Icon
Virus on laptop, malware or network vulnerability vector
Business Compliance Icons: User Profile, Update Compliance Tracker with 'X' mark, Vulnerability Fix.
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Three black hearts depicting stages of damage a striking silhouette
Vulnerability search. SEO optimization,web analytics, programmin
Cybersecurity line icon set. Vector pictograms of monitor lock, email alert, shield, hacker, server, cloud, password, fingerprint, firewall, VPN, USB drive, warning, thin linear illustration.
Understanding the threat of malicious software and its impact on digital security
Collection of cracked glass textures resembling bullet holes and breaks
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Baby footprints one dark and one outlined a simple graphic silhouette
Sea turtle and coral reef icons, symbolizing marine life protection, ocean conservation, and coral reef resilience against environmental changes
Set of hand-drawn business icons representing supply chain, logistics, network, connectivity, and technology concepts in a simple black and white sketch doodle style illustration
Fractured Lines: A graphic representation of three cracks, embodying fragility and imperfection, isolated and simple.
Icons depicting the impact of flooding on homes and individuals Vector
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Threat Analysis web banner icon set vector illustration concept for business with icon of Threat Detection, Incident, Vulnerability, Security Patch, Investigation, Malwa.
Modern Slavery and Human Trafficking Concept: Tied Wrists with Price Tag and Barcode Symbolizing Exploitation and Commodification of Labor
Adobe Illustrator Artwork
Broken Chain Link Symbol Representing Disconnection or Failure.
Penetration Icon In Black And White Outline Style
broken shield icon set consisting of multiple styles vector illustration
Powerful tsunami wave towers over city and boat illustrating catastrophic flooding danger urban vulnerability and nature’s destructive force
Set line broken or cracked lock icon isolated on white background, unlock sign, colorful vector icons set representing security breach
A tender and expressive vector illustration depicting a heartbroken cartoon bear with large, glistening tears streaming down its face, symbolizing profound sadness and emotional vulnerability
Group of people supporting each other in a moment of vulnerability and compassion.
Network security vulnerability icons with crossed out locks for cyber threat assessment
Cybersecurity vulnerability scan vector finding weak point in system
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Frayed rope symbolizes tension and potential breaking point.
Broken padlock icon symbolizing security breach vulnerability and unauthorized access representing a critical failure in data protection
Key Theft and Pursuit: Cyber Security Concept Illustration
Detached chain link icon set representing a severed connection or error.
Set of red broken hearts with cracks on white background, symbolizing heartbreak and emotional pain
Broken hearts and healing a collection of emotive heart icons
Vulnerability text with decimal number background
Cyber Threat Icon Set Multiple Style Collection
Cybersecurity Fundamentals web banner illustration featuring Cybersecurity, Malware, Phishing, Social engineering, Exploit, Vulnerability, and Password cracking.
A security shield with an exclamation point, symbolizing vulnerability.
Four red broken heart icons, illustrating heartbreak and sadness with different crack patterns
Vector illustration of, on transparent background Secure Wi-Fi network shield protection icon set
Damaged old iron fence showing security problem
Overwhelmed person bowing head amidst explosion of abstract colorful geometric shapes, symbolizing stress
risk Two-tone version in black and white background
Data Breach icon set. Includes data, breach, cyber, attack, hacking, leak, exposure and More. Editable Stroke Icon Collection.
Root Cause Icon Element For Design
Large set of black silhouettes featuring elderly men and women walking with canes in various hunched and standing poses for geriatric care and senior health concepts
Powerful tsunami wave towers over city and boat illustrating catastrophic flooding danger urban vulnerability and nature’s destructive force
Shopping basket next to warning triangle and bug icon highlights cybersecurity risks in online shopping. Ideal for e-commerce security, warning, technology, software vulnerabilities, online safety
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
A collection of line icons depicting various business and risk management concepts on a white background
Sign of Meltdown and spectre vulnerability on notebook monitor
Bug fixing doodle for improve website performance
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Cyber Security Icon Set In Black And White Filled Style Collection
Hacker activity icon set collection. Simple line color vector.
Dense Red Binary Array - Repeating Code Fragments on Dark Background
Cybersecurity Fundamentals web banner illustration featuring Cybersecurity, Malware, Phishing, Social engineering, Exploit, Vulnerability, and Password cracking.
Dramatic silhouette of falling man in distress, vector illustration for anxiety concepts, accident prevention campaigns, and crisis management visuals
Modern Silhouettes Information Technology, Cybersecurity, Data Management, Business Operations, and Professional Collaboration in Digital Settings
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Security Audit multiple icon
Risk Assessment Icon Element For Design
Abstract symbols linear icons set
Illustration of black and white brick wall with shield and arrow graphic illustrations
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Mental distress, fatigue, depression and contamination warning signs, headache and toxic fumes
Secure Coding Icon
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Vulnerability Icons
Failure Mode Outline Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
A collection of cybersecurity icons for protecting computer systems and data
magnifying glass inspecting a secured smart contract document vector illustration
Cyber Crime Attack. Cyber Security Alert With Glowing Unlock Icon In Red Protective Sphere, Digital Cybersecurity Warning Banner For Online Safety, Futuristic Tech Threat Concept, Vector Illustration
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Exploit Multistyle Icon Set
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
abstract black and white broken hearts tangled line heart shapes and ink splatters conveying love loss and emotional depth.
Stylized computer bug icon representing a software vulnerability or cybersecurity threat
Motorcycle helmets shattering into pieces, illustrating impact and destruction.
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Market Data Icon  in black line style icon, style isolated on white background
Stylized black wave curls toward small island with palm trees symbolizing ocean power danger isolation and tropical vulnerability
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Exploit Icon
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
Information Technologies Horizontal Banners
Vulnerability  Icon Set Multiple Style Collection
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Finger pointing at cyber security lock
Next page
/ 10