Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Lock and skull signifying cyber threats, gear symbolizing system operations. Ideal for security, hacking, IT systems, network protection, software vulnerabilities, data breaches, simple landing page
Security shields showing vulnerability and protection flat vector illustration
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
phone virus hack icon sign vector
Female psychologist and male patient talking in therapy session. Psychology, mental health support, counseling, emotional wellness concept. Flat vector illustration isolated on white background
broken lock line icon
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
vulnerability line icon
Zero Day Icon
Vector icon of a broken chain link symbolizing disconnect and separation
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Man in despair covering face vector silhouette
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
Failure Mode Outline Icon
Collection of security icons representing various aspects of online safety and data protection
A shield with cracks symbolizes vulnerability and resilience.
Risk  Outline Icon
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Protection and Security Concept
Data Leak icon vector image. Can be used for Compilance and Regulation.
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Website bug detection software security vulnerability testing and malware analysis tool
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Penetration Testing Icon
CyberSafe Shield Digital Security, Data Protection, Privacy
Illustration of a cyber attack: damaged shield on computer, surrounded by warnings, crossed documents, and a broken lock.
Futuristic cybersecurity vector concept with isometric design, showcasing advanced technology and data protection in a digital environment. Ideal for tech-related projects and presentations.
Risk Icon
Exploit Icon
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Cyber Threat Icon
Data security with chart and lock icon illustration
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Weakness Outline Icon
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Risk Icon
Security icon
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
 risk
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Network Defense Icon
Hacker activity icon set collection. Simple line color vector.
Penetration Testing Icon
Insider Threat Vector Icon. Person silhouette behind a damaged shield, internal security risk, isolated sketch for cybersecurity, data breach prevention, IT
Breach Icon
Insecure Icon
Risk Management Risk Management Bundle H50
Risk Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Zero Day Icon
Vulnerability Assessment Icon
Recognizing elder abuse, physical, psychological, economic, and environmental signs
Vulnerability Flat Icon
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Broken padlock on a laptop screen representing data vulnerability and hacking
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Vulnerability Assessment icon
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Data Breach Icon
Cyber threat Icon
Create a striking icon depicting a hooded figure, shrouded in shadow, hunched over a laptop, subtly suggesting hacking activity.
Emotional Vector Illustration of Sad Lonely Teenager Girl Sitting Alone with Knees Pulled to Chest, Minimalist Depression and Anxiety Concept for Mental Health Awareness, Youth Psychology Graphic
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Hacker activity icon set collection. Simple line vector.
Penetration Testing Icon
Honeypot Icon
Zero Day Icon
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
user protection icon sign vector
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Code Legacy  Icon Set Multiple Style Collection
Hacker stealing confidential data from a computer. Cybersecurity breach, data leak, and information theft concept. Cybercrime, internet privacy violation, security vulnerability, and phishing.
Broken shield icon Simple thin outline
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Vulnerability Icon
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Cybersecurity Icon Set collection with antivirus, password and internet icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Cyber threat Icon
Cybersecurity Icons Data Protection, Privacy, and Network Security
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Next page
/ 10