Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Laptop with lock, hacked login screen, cloud server, binary code, email vulnerability, and user data visualization. Ideal for digital security, hacking, data breaches privacy cybercrime system
3D Cartoon Ecology Metaphor
Vulnerability Icon
blonde woman delicately covers her eyes conveying a sense of vulnerability against a muted cityscape backdrop.
A senior citizen receives a COVID-19 vaccination, highlighting healthcare workers' dedication and the elderly's vulnerability to the virus.
Insecure Icon
Exploit Icon
Pleading Face Emoji
Abstract technology security global network background, vector
Compromised shield icon, security failure or data breach symbol. Broken protection and system vulnerability graphic, unsuccessful defense or attack illustration.
Hacker in the Shadows: An anonymous figure in a hooded sweatshirt intensely focused on a computer, symbolizing cybersecurity threats and digital crime in the digital realm.
Eavesdropping Icon
mortality death life aging icons set vector
Risk Vector Design Icon Style
 Comprehensive Vulnerability Scanner Icon
shield X line icon
Cybersecurity threat concept. Hacker phishing for sensitive data from server. Data breach and cybercrime illustration. Security vulnerability, malware attack, and internet fraud.
A woman trapped within a complex, chaotic web of tangled threads symbolizing deceit and lies.  Her expression conveys vulnerability and despair.
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Maintenance smartphone technology search system
Threat Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Online Robbery Icon
Trapped and Needing Help
vulnerability
email with virus, phishing vector icon
Exploit Icon
Cloud computing security breach for internet of things
Vulnerability Icon
Sad boy crying holding teddy bear in yellow shirt vector illustration
Exposure Icon
Eavesdropping Icon
mortality death life aging icons set vector
Disempowerment Glyph Blue Grey Icon
Sql Injection
Shield on a futuristic digital background. Concept of cybersecurity, antivirus protection and secure data transfer in a high-tech environment. Protection of information and Internet projects.
Risk Management Icon
Flat illustration of woman developing secure software with security shield and programming code
image of a sad girl
A darkhaired man embracing a blonde tearful child suggesting comfort or consolation
A minimalist sketch of a figure sitting in a posture of sadness and isolation.
Single transparent shrimp against deep blue ocean, minimalist composition.
Risk Icon
Adult Aggression and Child Vulnerability
1045 - Data Leak Concept Illustration
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Firewall Breach Vector Illustration Concept of Network Security Attack
QR code and tag on a smartphone beside a geometric Trojan horse and metadata tag. Ideal for cybersecurity, data encryption, digital banking, vulnerability awareness, digital threats, online payments
Vector outline broken padlock icon representing security risks and vulnerabilities
Data Breach Icon
mortality death life aging icons set vector
Distressed figure in monochrome with flowing paint, conveying vulnerability
Businessman using hypnosis with pendulum to influence employee. Vector concept of corporate manipulation, mind control, persuasion, suggestion, trance, compliance, and workplace power dynamics.
Vulnerability Assessment Icon
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Earth in Distress cry
Cybersecurity Process: A visual representation of a circular process highlighting key elements of cybersecurity, including enhanced privacy, user control, secure management, and reduced risk.
Security analysis or risk assessment, vulnerability assessment or threat detection, security audit or compliance check, data protection or encryption evaluation, network security or perimeter defense,
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple color vector
A black outlined triangle encloses an exclamation point on a white background, expressing warning
Unsafe Icon
The Impact of Cyberbullying
Shattered self-image. Broken mirror reflecting a fractured male face. Concept of identity crisis, mental turmoil, psychological distress, inner conflict, and despair. Hand holding mirror illustration.
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
Cybersecurity breach concept. Hacker stealing confidential documents and data from a laptop. Cybercrime vector illustration with a broken lock, warning sign, and internet thief. Security risk.
Minimalist Line Art of a Precarious House on Shifting Sands in 2
Vector outline unlocked padlock icon representing security vulnerabilities
Botnet Icon
Smartphone security vector concept featuring shield and padlock icons protecting device from hacker attacks and virus malware threats. Mobile cybersecurity and data privacy illustration.
Shield Slash Solid Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
Digital Shield: Protecting Your Data in the Cyber World. Secure Network, Data Privacy, Cyber
A hooded figure hunched over a glowing laptop in a dimly lit room, intensely focused on breaching a firewall, digital code cascading across the screen.
Hacker at computer, cybersecurity threat concept. Vector illustration of data breach, phishing, internet crime, and malware. Digital security, privacy protection, and network safety.
Online scam alert. Distressed man victim of cybersecurity threat, hacker on smartphone. Phishing, malware bug, data theft. Internet fraud, digital vulnerability, online safety, tech support concept.
Safe mode technology icon in the technological comb bacground
Cyber security concept of a phishing attack. Hacker stealing sensitive data and passwords from a computer. Data breach, internet fraud, identity theft, malware, and privacy risk vector.
Data Leak Icon
Parental Conflict and Child Impact
Patch Icon
Hardening Icon
Escalation Icon
Honeypot Icon
Vulnerability Icon
50 cybersecurity icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Exploit Icon
Childhood Fears and Nightmares
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Bullying and Distress
ear and Nightmares
Depressed Woman with Trauma from Bullying
Online Manipulation and Social Engineering
51 Attack Blue Icon
Cyber attack and data breach concept. Hacker stealing confidential information from laptop. Cybersecurity threat, phishing, identity theft, privacy violation and online fraud.
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Next page
/ 10