Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Digital Fortress Under Siege: A conceptual depiction of cybersecurity, showing a shield fractured by a cyberattack, emphasizing the vulnerability of digital data.
Weakness Outline Icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Emotional vulnerability. A character gently opening up through floating speech bubbles with simple symbols, representing honest expression.
Woman Depressed, Hands Covering Face, Red Background, Anxiety, Stress, Sadness, Burnout, Mental Health, Emotional Pain, Depression, Vector Illustration , vector style simple color
Cybersecurity issue icon
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Security Testing Icon
Exploit Icon
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Cracked shield with lightning bolt and circuit board elements on dark background symbolizing cyber security breach or vulnerability
Blockchain security line icon set. Editable stroke. Vector illustration
Penetration Testing Icon
Protection background. Technology security, encode and decrypt.
Cybersecurity Network Protection Diagram with Central Lock Icon for Data Security and Digital Privacy Compliance
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Security Scan Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Magnifying glass searching for viruses, malware, software bugs
Threat Detection icon set multiple style collection
malware, cyber attack line vector icon
vulnerability flower, 6 black delicate line drawings vector set collection , white background , PNG and SVG
Isometric cybersecurity icons with warning symbols in vector art
Online Robbery Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Virus on laptop, malware or network vulnerability vector
Financial distress concept highlighting credit risk, insolvency exposure, and systemic vulnerability across economic cycles. in Lineal Icon Style
Cybersecurity related editable icon set. Contain icons related to data protection, internet security, privacy, firewall, encryption, secure network, hacking protection, and more. Editable stroke.
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
System threat detection and digital data vulnerability search concept.eps
Risk Icon
Login Password Laptop Composition
Cybersecurity and network protection icons including cluster firewall vulnerability scan and threat detection elements
Risk Blue And White Icon Style Collection
Icons representing various types of cybersecurity threats and vulnerabilities
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Quiet Vulnerability. Facing a personal crisis with vulnerability. A single character sitting quietly with head slightly lowered, surrounded by soft abstract
Nature's Fragile Balance. Threatened habitats. Forest and ocean fragments breaking into abstract shapes,
Four black padlocks with one broken and cracking open
vulnerability flower , realistic line art vector set , white background , PNG and SVG isolate
Striking graphic portraying a person's inner emotional turmoil and concealed vulnerability
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Hearing loss concept. Human ear disease or disability. Deaf person
Broken shield icon simple vector isolated symbol
spectre and meltdown email spyware virus attack vulnerability vector illustration
Penetration Testing Icon
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Outline Hacker Attack. Isometric Cyber Security Concept.
Programmers and IT Specialists at Work: A collection of illustrations detailing development workflow, troubleshooting, collaboration, and success.
Honeypot Icon
Internet Security Isometric Design Concept
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
vector icon of a document with a shield with a blue background in the shape of a shield
unprotected
Certified Ethical Hacker - CEH - icon set & web header banner
Software security vulnerability assessment using robots and professionals
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Risk management line outline icon
Risk Assessment Icon Set Multiple Style Collection
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
Network Vulnerability, Vulnerable Smart Devices - IT Security Concept Design, Vector illustration
Vulnerability Icon
user protection icon sign vector
Antivirus software searching for viruses, malwares and vulnerabilities.
Abstract technology security on global network background, vector illustration
System administrator online service or platform set. Technical work with server
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Young people helping erderly at the bus stop. Blind man with guide dog, old woman with a cane, elderly man in a wheelchair. Social helping concept. Vector illustration.
Cybersecurity vulnerability black glyph icon. System weakness and flaw. Cybercriminal gains access. Errors exploitation. Silhouette symbol on white space. Vector isolated illustration
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
malware, cyber attack or virus line icon
vulnerability search icon. Vector illustration
Magnifying Glass Inspecting Warning Sign Risk Analysis Icon
Risk Icon
thin line assess icon like review audit risk
Penetration testing vs vulnerability scanning flat style background design.
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Oil spill impact. A seabird standing on darkened water with subtle oil patterns, expressing vulnerability without drama. Abstract shapes
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
computer cyber security icon sign vector
脆弱性を表すパズル
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
vulnerability search icon. Vector illustration
Next page
/ 10