Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Design a set of striking icons warning of a data breach, incorporating elements of vulnerability and security compromise.
Cyber Threat Icon
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Trustworthy and honesty to believe in work together, integrity or trust for partnership, support and reliable to help success together concept, businessman acrobat hold hand tight by trusted partner.
Shield with target or crosshair for vulnerability assessment, targeted attack detection, or security risk ID. Symbolizes focus on specific threats now.
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Cyber Threat Icon
an elderly woman coughing with virus particles spreading in the air. The image highlights health risks, virus transmission, and vulnerability of seniors to infectious diseases. Suitable for healthcare
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Vulnerability search. SEO optimization,web analytics, programmin
Antivirus software searching for viruses, malwares and vulnerabilities.
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Vulnerability Assessment Icon
Abstract technology security on global network background, vector illustration
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Abstract technology security on global network background, vector illustration
Security Breach Icon
Firewall vulnerability icons Security breach represented by burning brick wall icons
Vulnerability
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Zero Day Icon
Cloud facing incoming DDoS attack illustrations paired with a data analysis pie chart for impact assessment. Ideal for cybersecurity, data protection, IT infrastructure, risk management, analytics
Certified Ethical Hacker - CEH - icon set & web header banner
Worm or larva icon, commonly representing a computer worm (malware), a software bug, or a system vulnerability that needs to be addressed quickly.
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
computer virus icon sign vector
vulnerability search icon. Vector illustration
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
hacker scammer computer technology. cyber security concept. attack and data digital. dangers of internet theft
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
A cracked shield symbolizes vulnerability and exposed weakness.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
weathered wooden pier partially submerged in water showcasing a flood scene  Illustrative style clear composition evokes a sense of vulnerability and nature's power
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Line style icons of smart contracts: smart contract audit checklist, security analysis icon, critical vulnerability detector, contract code review, manual audit badge, smart contract scanner tool,
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Internet Security Isometric Design Concept
Zero Day Icon
Open backdoor in a black wall cybersecurity concept illustration
System administrator online service or platform set. Technical work with server
Crying girl with closed eyes showing sadness and mental health vulnerability
Vector illustration of the word "Self-Esteem" shattered like broken glass, symbolizing emotional fragility and loss of self-worth.
Mental Health Awareness: A stark graphic illustrates the complexities of mental health challenges, symbolized by an iceberg, with the visible tip representing awareness.
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Malware icon with long shadow
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Threat Icon
Cybersecurity vulnerability black glyph icon. System weakness and flaw. Cybercriminal gains access. Errors exploitation. Silhouette symbol on white space. Vector isolated illustration
unsecure icon
Ask For Help Icon
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Conceptual illustration of a house under a storm cloud representing vulnerability and hardship
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Risk Factor icon vector image. Can be used for Privacy.
Data Breach Alert: The screen displays a stark warning of a data breach, symbolizing the digital vulnerability and the risks associated with cyber threats.
System Vulnerability Icon
Tense national security briefing; senior officials analyze critical digital warfare vulnerabilities & countermeasures.
spectre and meltdown email spyware virus attack vulnerability vector illustration
Two silhouetted hands with fingers spread, symbolizing openness and vulnerability
Vector artwork of the word "Anxiety" shattered like glass, symbolizing mental tension, fear, and emotional instability.
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Abstract technology security on global network background, vector illustration
Outline Hacker Attack. Isometric Cyber Security Concept.
Vulnerability Icon
Self-Esteem Icon
Abstract symbols linear icons set
Risk Assessment Icon
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Shield with X icon in trendy flat style. Vulnerability symbol for your web site design, logo, app, UI Vector EPS 10.
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
ネットワークセキュリティのイメージイラスト
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
System Vulnerability Icon
Security Breach Icon
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
An elderly man standing and looking worried, showing concern and anxiety. The illustration reflects emotional vulnerability and senior health awareness in a simple style.
Broken chain link with shield icon symbolizes security breach or vulnerability
A mother shields her child from a fierce wind, conveying vulnerability and resilience. Dramatic illustration with a muted color palette. Evokes emotion and urgency.
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
malware flat gradient icon
An AIdriven pest management system using data from weather pest populations and crop vulnerability to create targeted and environmentallyfriendly solutions for pest control.. Vector illustration
Threat Icon
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Vulnerability text with decimal number background
patch update solid
vulnerability woman mirror fear vector
Security Vulnerabilities Flat Icon
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Data breach and information leakage after cyber attack tiny person concept, transparent background. Hacking threat and privacy danger after connection vulnerability illustration.
Next page
/ 10