Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Vulnerability Assessment Icon
Cyber threat Icon
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple flat vector illustration.
Risk Management Framework icon set in Mixed style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Security Patch icon
Cyber Risks Icon Style
Security scan Icon
Cybersecurity Risk Icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
AI cybersecurity risks and machine learning vulnerabilities in digital security. AI security threats, data breaches, hacking risks and advanced protection strategies. Cybersecurity vector illustration
AI technology in security set. Characters using artificial intelligence, algorithms, generative tools for data protection, cybersecurity, privacy, hacking threats prevention. Vector illustration.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
A smartphone displays a shield symbol, emphasizing security features designed to protect user data online Phone with security features, illustrated in a flat style.
computer protection icon sign vector
Security Breach
Failure Mode Outline Icon
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
A comprehensive set of icons illustrating various aspects of cyber attacks, including threats, defenses, and security measures.
Bug Icon – Software Error, Debugging, Malware Detection, IT Security Symbol
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Cyber threat Icon
System Vulnerability Icon
The program offers a safe space for individuals to share their vulnerabilities and receive understanding and validation from their peers.. Vector illustration
Illustration of a man using a laptop with an unlocked password, signifying data security issues Consider using it for cybersecurity or data protection concepts.
shield X glyph icon
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Detection Icon
Security Risks Icon Style
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
password fraud icon sign vector
Security Breach
Weakness Outline Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
cyber security icon sign vector
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple glyph vector
Threat Icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
cyber security icon sign vector
Risk Icon
Broken shield icon Simple thin outline
Cybersecurity consulting service gradient header information consultant professional solution for company information technology cyber security
Cybersecurity Risk Icon
Honeypot Icon
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Cyber Attack Line Icon Sheet
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Penetration Testing Icon
Risk Flat Icon
Exploit Icon
security assurance icon sign vector
 Icon of Vulnerability for Security Management
Threat Icon
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
vulnerability line icon
Supply Chain Risk Icon
Risk  Outline Icon
Penetration Testing Icon
Sad depressed woman in despair and grief mood, sitting curled up, hugging knees. Frustrated desperate upset female, overwhelmed by sorrow. Flat vector illustration isolated on white background
network warning glyph icon
data and document protection
Risk Factors Icon
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Security warning shield indicating a potential threat or vulnerability
Risk Icon
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
 risk
Risk Icon
Threat Icon
Next page
/ 10