Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Vulnerability Glyph Icon
Cyber Crime Icons Pack,Breach Line Icon
Vector Risk management process diagram schema
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Mutual accusations and misunderstanding
Incident Icon
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
Flat illustration of woman checking system security of cybersecurity audit with magnifying glass
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Certified Ethical Hacking icon showing security and hacking idea
Zero Day Exploit Icon
Breach
vulnerability
Online Robbery Icon
Firewall Icon
Failure Glyph Icon
A young girl with a distressed expression, tears streaming down her cheeks, conveys sadness and vulnerability in a flat vector illustration style.
Risk management linear icons set. Probability, Uncertainty, Mitigation, Contingency, Hazards, Vulnerability, Security line vector and concept signs. Resilience,Exposure,Loss outline Generative AI
Exploit Icon
Vulnerability Flat Icon
Cyber Crime Icons Pack,Computer Bug Blue Icon
1045 - Data Leak Concept Illustration
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Zero Day Icon
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Bug Icon
Open Source Icon
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Supply Chain Risk Icon
vulnerability line icon
Breach
vulnerability
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Risk Management Icon
AI cybersecurity risks and machine learning vulnerabilities in digital security. AI security threats, data breaches, hacking risks and advanced protection strategies. Cybersecurity vector illustration
Embrace Your Flaws: The Beauty of Imperfection in a Cracked Vessel
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Honeypot Icon
Vulnerability Blue Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Illustration of an icon showing a baby crawling toward a bottle of poison, symbolizing a potential danger or safety hazard
Online Robbery Icon
Ethical hacker isolated cartoon vector illustrations.
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Abstract technology security global network background, vector
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Threat Vector Icon Design
Cybersecurity concept vector illustration showing a hacker with phishing hooks targeting email, credit card, and secure data
poor man starving silhouette vector design art and illustration
Market Data Icon  in black line style icon, style isolated on white background
Minimalist Vulnerability Scan Icon, Blue and Green Tones, Cybersecurity Concept
A hook dangles from a mobile phone, hooking a yellow file folder, symbolizing the concept of internet phishing in a visually striking manner
System Hardening Icon
Hacker icon cyber spy, hacker icon, hacker icon set.
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
security line icon
Exploit Icon
Vulnerability Outline Icon
Supply Chain Risk Icon
Security Outline Icon
Penetration Testing Icon
Cyber Intelligence Icon
Security Audit Icon
Firewall Icon
Risk Management Icon
System Hardening Icon
Penetration Testing Icon
Cyber Intelligence Icon
Security Audit Icon
Firewall Icon
Risk Management Icon
System Hardening Icon
Penetration Testing Icon
Cyber Intelligence Icon
Security Audit Icon
Firewall Icon
Security Audit Icon
Failure Mode Outline Color Icon
Risk Management Icon
Risk Assessment Flat Icon
Zero Day Vulnerability Outline Icon
Cyber Security Incident Glyph Icon
Vulnerability Glyph Icon
Cyber Security Incident Flat Icon
Vulnerability Flat Icon
Vulnerability Blue Icon
Risk Assessment Glyph Icon
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple flat outline vector illustration
Risk Assessment Blue Icon
Franchise Risk Outline Icon
Exploit Outline Color Icon
Malware Glyph Icon
Malware Flat Icon
Security Outline Color Icon
Data Leakage Flat Icon
Vulnerability Outline Color Icon
Risk Blue Icon
Next page
/ 10