Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Cybersecurity defense icons including red team simulator automated penetration testing broken chain link security penetration simulator protection vulnerability cybersecurity mitigation
This illustration conveys the vulnerability of individuals to viruses and disease. It's ideal for health-related content, awareness campaigns, or arti
Cybersecurity icons for vulnerability prioritization attack surface mapping exploit mitigation with protection strategy cyber threat risk management security assessment data security network secu
Against a cityscape silhouette, a damaged power line is spotlighted, contrasting a flashlight with a candle, creating a symbolic illustration of energy infrastructure vulnerability
Man on the edge of a cliff, contemplating a leap into the unknown, illustrating a moment of decision and vulnerability
Entangled heart a sketch of love and pain representing complex emotions and vulnerability in a raw form
Digital security concepts including password protection, phishing awareness, multi-factor authentication, data encryption, vulnerability scanning, physical security, insider
Cyber Crime and Digital Security Minimalist Monoline Geometric Line Art for Network Protection and Data Privacy Interface Design.
Cybersecurity icons collection featuring penetration testing, risk analysis, security audit, social engineering, phishing simulation, code review, vulnerability scan, network
Silhouette child with radiating energy and protective shield with handprints conveys concepts of vulnerability and safety.
Secure Code: Two gold padlocks symbolize security and access, one locked with a coded key and the other unlocked, representing either protection or vulnerability
A progression of hearts from solid to fragmented to outline illustrating emotional stages and vulnerability
Root Cause Icon Element For Design
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
A person falling backwards in a dynamic pose depicted as a silhouette
Vulnerability Icons
Hardening Icon
Cybersecurity vulnerability scan vector finding weak point in system
Virus detection icon set with scan,quarantine,sandbox and system update concepts.Ideal for antivirus software,malware analysis and cybersecurity monitoring systems.
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
This illustration conveys the vulnerability of human health to viral threats. Ideal for health awareness campaigns, medical content, or educational ma
Breach icon sheet multiple style collection
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Bug fixing doodle for improve website performance
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Computer programming icon set with building, hardware, computing, cpu, usability, efficiency, analysis, designing, function, software, development, prototyping, decomposition, source code, engineering
Abstract technology security global network background, vector
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
A patient's bare feet walk cautiously down a sterile hospital corridor, symbolizing recovery, vulnerability, and the journey through medical care.
Cyber crime and hacker attack concept demonstrating hackers stealing sensitive data using technology in a digital environment
Security Breach Icon
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
The image shows multiple irregular fragments of shattered glass scattered on a white background. The fragments vary in size and shape, with some showing sharp edges and others appearing
Breach Icon
Cybersecurity set. Protecting data from threats. Users confronting various malware types: virus, ransomware, spyware. Adware dangers, botnet traps, worm intrusions. Flat vector illustration
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Disruption Multistyle Icon Set
Risk Assessment Icon Element For Design
Security Audit multistyle icon
Hacker activity icon set collection. Simple line color vector.
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Failure Mode Outline Icon
Broken shield icon representing vulnerability security risk and system failure showing a lack of protection against digital cyber attack
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Abstract technology security on global network background, vector illustration
Security threats icon with shield and lightning bolt symbolizing cyber risk, protection issues, system vulnerability and danger vector illustration
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Digital lock protect data flow in global network
Market Data Icon  in black line style icon, style isolated on white background
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Network Defense workflow for securing infrastructure from cyber threats and attacks with layered protection strategies
Digital security padlock icon with network connections on a dark blue background
Secure Coding Icon
Illustration depicting various aspects of cybersecurity and data protection Vector
Virus detection icon set with scan,quarantine,sandbox and system update concepts.Ideal for antivirus software,malware analysis and cybersecurity monitoring systems.
Exploit Multistyle Icon Set
Flooded valley infrastructure damage illustration with a minimal bridge partially submerged and water flowing beneath, expressing vulnerability of transport
Broken Shield Symbol Vector Defense Failure Logo Templates
人物
Cloud security vector line icons set. Cloud, security, infrastructure, data, authentication, compliance, encryption illustration outline concept symbols and signs
Crime scene on a laptop
Various icons representing different human emotions and mental states depicted in a simple, monochromatic style for educational purposes
Security icon set, shield, lock, firewall, fingerprint, warning, password, protection signs
Continuous Line Drawing of a Shield with Sound Waves. Continuous line style. Hand drawn. Line art. Vector design. illustration
Contrast between secure and vulnerable neural network systems
Vector Icon of Bug Shield for Cybersecurity and Virus Protection Illustration
Vulnerability Embrace Icon
Data exfiltration alert and cybersecurity threat detection concept illustration. EPS Editable. Vector Illustrations.
Shopping basket next to warning triangle and bug icon highlights cybersecurity risks in online shopping. Ideal for e-commerce security, warning, technology, software vulnerabilities, online safety
Broken black shield icon representing shattered protection and vulnerability
Secure Cloud Data Storage - Mobile Phone Shielded by Protection.
Illustration of cybersecurity concepts including hackers, firewalls, and secure databases. Vector
Security Testing Icon
Concept of domestic violence - silhouette of a woman's head and other hands gesture. Vector illustration on a white background.
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Encryption Shield Against Silent Digital Threat Technology Background
Collection of six cybersecurity icons representing hacking, surveillance, coding, access, data, and network security.
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Cyber Security Icons Set 1.
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Cyber Defense web banner icon vector illustration with icons of Cyber Security,Cyber Attack,Cyber Defense,Hacker,Cybercrime,Vulnerability and Exploit
Vulnerability icon set featuring zero day,exploit and data breach.Ideal for cybersecurity analysis and threat detection concepts.
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Cyber Defense web banner icon vector illustration with icons of Cyber Security,Cyber Attack,Cyber Defense,Hacker,Cybercrime,Vulnerability and Exploit
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Virus detection icon set with scan,quarantine,sandbox and system update concepts.Ideal for antivirus software,malware analysis and cybersecurity monitoring systems.
Cyber Defense web banner icon vector illustration with icons of Cyber Security,Cyber Attack,Cyber Defense,Hacker,Cybercrime,Vulnerability and Exploit
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Virus detection icon set with scan,quarantine,sandbox and system update concepts.Ideal for antivirus software,malware analysis and cybersecurity monitoring systems.
Vulnerability icon set featuring zero day,exploit and data breach.Ideal for cybersecurity analysis and threat detection concepts.
Virus detection icon set with scan,quarantine,sandbox and system update concepts.Ideal for antivirus software,malware analysis and cybersecurity monitoring systems.
Next page
/ 10