Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
security specialist holding shield deflecting cyber attacks from multiple devices, vector illustration for firewall protection, network intrusion prevention, cybersecurity defense and data breach
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Network Defense Icon
Configuration Vulnerability Assesement
Penetration Testing Icon
Risk Management Risk Management Bundle H50
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
user protection icon sign vector
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Website bug detection software security vulnerability testing and malware analysis tool
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Vulnerability Flat Icon
System Vulnerability Icon
Insider Threat Vector Icon. Person silhouette behind a damaged shield, internal security risk, isolated sketch for cybersecurity, data breach prevention, IT
Security icon
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
Risk  Outline Icon
A shield with cracks symbolizes vulnerability and resilience.
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Data Breach Icon
Risk Icon
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Vulnerability Assessment icon
Penetration Testing Icon
Cybersecurity Icons Data Protection, Privacy, and Network Security
Collection of security icons representing various aspects of online safety and data protection
 risk
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Man in despair covering face vector silhouette
Futuristic cybersecurity vector concept with isometric design, showcasing advanced technology and data protection in a digital environment. Ideal for tech-related projects and presentations.
Weakness Outline Icon
Zero Day Icon
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Hacker activity icon set collection. Simple line vector.
Honeypot Icon
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Risk Icon
Exploit Icon
Data breach concept. Hacker stealing confidential information, personal data. Cybercrime. Identity theft. Phishing. Cybersecurity. Thief with data sack. Email. Password. Security risk. Privacy.
Risk Assessment Icon Set Multiple Style Collection
CyberSafe Shield Digital Security, Data Protection, Privacy
Vulnerability Icon
Create a striking icon depicting a hooded figure, shrouded in shadow, hunched over a laptop, subtly suggesting hacking activity.
Cyber threat Icon
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Hacker stealing confidential data from a computer. Cybersecurity breach, data leak, and information theft concept. Cybercrime, internet privacy violation, security vulnerability, and phishing.
broken lock line icon
Pleading Face Emoji
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Risk Glyph Icon
Zero Day Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Hacker activity icon set collection. Simple color fill vector.
Cybersecurity Risk Icon
Vulnerability Assessment Icon
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
Recognizing elder abuse, physical, psychological, economic, and environmental signs
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Cyber threat Icon
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Emotional Vector Illustration of Sad Lonely Teenager Girl Sitting Alone with Knees Pulled to Chest, Minimalist Depression and Anxiety Concept for Mental Health Awareness, Youth Psychology Graphic
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Security Audit Icon
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Failure Mode Outline Icon
Cyber Threat Icon
Application security practices infographic 5 steps. Threat management, access control. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used
Illustration of a cyber attack: damaged shield on computer, surrounded by warnings, crossed documents, and a broken lock.
Vector icon of a broken chain link symbolizing disconnect and separation
Insecure Icon
Security shield with exclamation mark warning icon
Zero Day Icon
Broken shield icon Simple thin outline
Broken padlock on a laptop screen representing data vulnerability and hacking
Cybersecurity Icon Set collection with antivirus, password and internet icon
Penetration Testing Icon
Data Leak icon vector image. Can be used for Compilance and Regulation.
Cyber threat Icon
Risk Icon
phone virus hack icon sign vector
Next page
/ 10