Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Penetration Testing Icon
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Threat Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
vulnerability cyber security system illustration lock symbol circuit broken
Flat illustration of woman managing IoT security internet of things protection
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Risk Factor Outline Icon
Cybersecurity Risk Icon
Hacking concept
Threat Icon
Exploit Icon
Insecure Icon
personal information fraud icon sign vector
Vulnerability Icon
Dpia protecting data with shield and lock symbol
Penetration Testing Icon
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
vulnerability glyph style icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Cyber threat Icon
Secure padlock icon within a shield, symbolizing data protection and online safety.  A simple yet powerful graphic for security-related projects.
Threat Icon
virus in mail icon sign vector
Zero Day Blue Icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
One Line Journey to Authenticity: Unmasking the True Self
data and document protection
Cybersecurity Risk Icon
Security Vulnerability Icon
Breach Icon
Exploit Icon
Risk
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Futuristic cybersecurity vector concept with isometric design, showcasing advanced technology and data protection in a digital environment. Ideal for tech-related projects and presentations.
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
Cyber Threat Icon
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Laughter and tears mingle together as the poets share their work their vulnerability and strength shining through with each verse.. Vector illustration
Risk Icon
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Threat Icon
warning on browser icon sign vector
Failure Mode Glyph Icon
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Set of 8 "weakness" icons, 1 unexpanded, 1 silhouette - Weakness icon representing fatigue low energy or vulnerability ideal for health n wellness applications
Insider Threat Icon
This vibrant illustration features various elements depicting disproportionate ransomware threats, Customizable illustration of disproportionate ransomware.
Detection Icon
Exploit Icon
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
Visual representation of software vulnerability detection icon illustration
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
A woman standing in fear beneath two large hands in a flat, minimal design style vector illustration depicting vulnerability and tension in an abstract environment
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
AI in Cybersecurity abstract concept vector illustrations.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Flat isometric illustration concept.  security network
Risk Icon
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Threat Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Zero Day Glyph Icon
broken padlock glyph icon
Information security analyst icons outline key concepts like surveillance, access control, and data protection, transparent background. Outline icons set
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Insider Threat Icon
Digital lock protect data flow in global network
Decryption Icon
Exploit Icon
Insecure Icon
AI technology in security set. Characters using artificial intelligence, algorithms, generative tools for data protection, cybersecurity, privacy, hacking threats prevention. Vector illustration.
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Emotional Vulnerability Icon
Ethical hacker abstract concept vector illustration.
Vulnerability Icon
Social Inequality Line Banner Web Icon Set Vector Illustration, Inequity Exclusion Wealth Prejudice Social Class Hierarchy Fragmentation Education Level
Cyber threat Icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Threat Icon
Vulnerability Icon
Zero Day Flat Icon
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Insider Threat Icon
Password Cracking icon line vector illustration
Vulnerability Icon
Exploit Icon
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Simple set of vulnerability related filled icons.
vulnerability search icon. Vector illustration
Vulnerability Icon
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Next page
/ 10