Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Symbolic representation of vulnerability and growth in a minimalist design
Threat Icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Cybersecurity vulnerability illustration with shield and bug inside window
Abstract technology security on global network background, vector illustration
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Simple set of vulnerability related filled icons.
Cyber scanner Icon
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
breach cyber security system concept illustration
Certified Ethical Hacker - CEH - icon set & web header banner
Risk Icon
vulnerability search icon. Vector illustration
Cybersecurity Risk Icon
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Website audit or digital compliance check, performance analysis or speed testing, security scan or vulnerability assessment, user experience or interface evaluation, mobile responsiveness
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
Virus on laptop, malware or network vulnerability vector
Abstract technology security on global network background, vector illustration
cybersecurity data protection icon sign vector
Bug on computer screen, software vulnerability graphic illustration
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Cracked surface revealing a hole, breaking apart and fracturing, symbolizing themes of destruction, damage, and vulnerability while showcasing the impact of stress and pressure
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Unlocked lock illustration representing vulnerability and security in a colorful design
Outline Hacker Attack. Isometric Cyber Security Concept.
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Vector illustration of a coder on an open padlock with code tags, symbolizing open-source software security, programming vulnerabilities, and technology access control concept.
Antivirus software searching for viruses, malwares and vulnerabilities.
Risk Icon
Vulnerability search. SEO optimization,web analytics, programmin
Data Leak Icon
warning on browser icon sign vector
Cars and Floods – Vector graphic of flooded city cars, highlighting environmental risks, storm effects, and transportation vulnerability due to rising water levels.
Broken chain link with shield icon symbolizes security breach or vulnerability
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Abstract technology security on global network background, vector illustration
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Network vulnerability highlighted by bug icon and computer screens
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
thin line assess icon like review audit risk
Virus Infected icon in vector. Logotype
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
Risk Icon
vulnerability search icon. Vector illustration
virus line icon
spectre & meltdown processor bugs - cyber security vulnerability
spectre and meltdown email spyware virus attack vulnerability vector illustration
Emotional Vulnerability Icon
Businessman shaking hands with a hacker through a laptop screen, illustrating cybercrime risks, online scams, phishing dangers, malware threats, and digital security vulnerabilities concept.
Abstract technology security on global network background, vector illustration
Cybersecurity vulnerability black glyph icon. System weakness and flaw. Cybercriminal gains access. Errors exploitation. Silhouette symbol on white space. Vector isolated illustration
Mobile phone data breach vulnerability represented as fishing hook
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Vulnerability Icon
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Isometric flat vector icons of Cyber Defense Systems: honeypot decoy server, digital breach simulator, perimeter security layer, vulnerability scanner tool, security event log viewer, breach
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Root Cause Icon Element For Design
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
傷ついた盾のシンプルなイラスト
Risk Assessment Icon
Minimal black silhouette of person standing on cliff edge with outstretched arms, dramatic white background, symbolizing freedom, triumph, contemplation, or vulnerability in bold illustration
malware flat gradient icon
A distressed bunny rabbit, sporting bandages, with a hidden knife subtly positioned behind its back.  Depict a sense of vulnerability and hidden danger.
Open backdoor in a black wall cybersecurity concept illustration
Risk Assessment Icon Element For Design
Broken padlock on a laptop screen representing data vulnerability and hacking
Flat line art vector illustration of a developer coding on a laptop next to an open padlock code symbol representing open source security vulnerability and cybersecurity access.
A woman wearing a distressed expression visibly displays emotional pain, showcasing her deep vulnerability and turmoil
Abstract symbols linear icons set
Laptop vulnerability concept illustration of malware and cyber attack
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Tense national security briefing; senior officials analyze critical digital warfare vulnerabilities & countermeasures.
Line style icons of smart contracts: smart contract audit checklist, security analysis icon, critical vulnerability detector, contract code review, manual audit badge, smart contract scanner tool,
System administrator online service or platform set. Technical work with server
Trustworthy and honesty to believe in work together, integrity or trust for partnership, support and reliable to help success together concept, businessman acrobat hold hand tight by trusted partner.
Threat Icon
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Penetration Testing Icon
Security Vulnerabilities Blue Icon
Security Breach Icon
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Next page
/ 10