Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Zero Day Flat Icon
risk
security antivirus check mark icon sign vector
Failure Vector  Or Logo Sign Symbol Illustration
A shield with a spine and cracks symbolizes vulnerability and fragility.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
AI in Cybersecurity abstract concept vector illustrations.
Exploit Icon
Vulnerability Icon
Penetration Testing Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
data and document protection
Hacking glyph icon
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
User Interface Security Icons Privacy, Protection, and Access Control
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Neon half tone shield representing vulnerability in digital world with glowing lines
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Zero Day Glyph Icon
warning on browser icon sign vector
computer protection icon sign vector
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Open Source Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Security Breach
A hand delicately pierces a balloon labeled ego, symbolizing the fragility of self-importance in a serene and minimalistic setting that evokes thought and reflection
Threat Assessment Icon
Risk Assessment Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cyber Attack Line Icon Sheet
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
silhouette of a girl and  domestic violence
Security Patch icon
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Hacking glyph icon
Franchise Risk Blue Icon
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Zero Day Icon
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Security Breach Icon
Penetration Testing Icon
Broken shield icon Simple thin outline
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Vulnerability Icon
System Vulnerability Icon
Security Testing vector icon illustration of Quality Assurance iconset.
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Minimalist Trojan Horse Icon, Blue and Green Tones, Cybersecurity Concept
Exploit Icon
virus line icon
security assurance icon sign vector
Encircling Care: A Single-Line Embrace of Vulnerability
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Failure Mode Flat Icon
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Penetration Testing Icon
1049 - Risk Concept Illustration
Security warning shield indicating a potential threat or vulnerability
broken padlock glyph icon
Supply Chain Risk Icon
Security Testing vector icon illustration of Quality Assurance iconset.
Security Testing Icon
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Patch software. Operating system updates that address security vulnerabilities
Risk Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
risk
Risk Icon Outline Blue
Zero Day Blue Icon
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Vulnerability Icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Risk Icon
Sicherheitslücke finden
Next page
/ 10