Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
vulnerability line icon
Vulnerability Glyph Icon
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
Hacker Silhouette Icon for Cybersecurity and Data Privacy Themes
SVG showing cyber threats impacting energy security. Energy Security and Threats: A Conceptual Illustration of Protection
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Cloud hacking or unauthorized access, cloud security or data breach, cloud vulnerability or cyberattack, cloud encryption or data protection, hacking attempts or cybercrime, cloud-based systems
Black Silhouette of a Hedgehog – Rounded Body with Spiky Back, Sharp Quills, Small Face, and Tiny Legs, Symbolizing Cuteness, Nature’s Resilience, and the Innocence of Forest Wildlife
Cyber Risks Icon Style
vulnerability
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Mutual Support Giving up seat in public transport -modern flat vector concept illustration of man offering his seat to elderly woman on bus A metaphor of voluntary, collaborative exchanges of services
A shadowy figure, digitally manipulated, symbolizes the hidden perpetrator of cyberbullying, highlighted by a single spotlight.  Illustrate the vulnerability of the victim.
Exploit Icon
Patching Icon
Vulnerability Assessment icon
image of a sad girl
blonde woman delicately covers her eyes conveying a sense of vulnerability against a muted cityscape backdrop.
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
A senior citizen receives a COVID-19 vaccination, highlighting healthcare workers' dedication and the elderly's vulnerability to the virus.
Vulnerability Outline Color Icon
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Pleading Face Emoji
Online Robbery Icon
Abstract technology security global network background, vector
Software bug or coding errors, system malfunction or software crash, performance issues or application slowdown, data corruption or file errors, security vulnerability or exploit, coding mistake or lo
Hybrid Intrusion monitoring and detection concept, Real-time adaptive security vector design, Web hosting service Symbol, Computing machines Sign, Internet Application Management stock illustration
Security Risks Icon Style
vulnerability
Information security analyst icons outline key concepts like surveillance, access control, and data protection. Outline icons set
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Maintenance smartphone technology search system
mortality death life aging icons set vector
Zero Day Icon
Eavesdropping Icon
Detection vulnerability illustration of system bugs and network threats
Emotional Vulnerability Vector Icon
A woman trapped within a complex, chaotic web of tangled threads symbolizing deceit and lies.  Her expression conveys vulnerability and despair.
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Antivirus line editable set. Containing malware, security, trojan, spyware, firewall, scan, protection, and more icons. Vector illustration
Security Outline Color Icon
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Understanding Error and How to Debug For a Good Code
Security Testing Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Trapped and Needing Help
Sad woman with tears streaming down her face in flat vector illustration style conveying deep emotion and vulnerability in a minimalist design vector art
Risk Vector Design Icon Style
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Cloud computing security breach for internet of things
Two women expressing emotions in a minimal style, one thoughtful and one distressed, conveying a sense of vulnerability in vector illustration
Exploit Icon
Eavesdropping Icon
Stylized depiction of flood, emphasizing climate change vulnerability icon
email with virus, phishing vector icon
Cyber security technology on circuit board. Abstract background futuristic Hi tech style, Technology data protection system, Internet security and safety information personal, Vector and Illustration.
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Sad boy crying holding teddy bear in yellow shirt vector illustration
51 Attack Outline Icon
Disempowerment Glyph Blue Grey Icon
Sql Injection
Shield on a futuristic digital background. Concept of cybersecurity, antivirus protection and secure data transfer in a high-tech environment. Protection of information and Internet projects.
A minimalist sketch of a figure sitting in a posture of sadness and isolation.
Adult Aggression and Child Vulnerability
Single transparent shrimp against deep blue ocean, minimalist composition.
1045 - Data Leak Concept Illustration
Flat illustration of woman developing secure software with security shield and programming code
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Firewall Breach Vector Illustration Concept of Network Security Attack
QR code and tag on a smartphone beside a geometric Trojan horse and metadata tag. Ideal for cybersecurity, data encryption, digital banking, vulnerability awareness, digital threats, online payments
Exploit Icon
Data Breach Icon
Distressed figure in monochrome with flowing paint, conveying vulnerability
Server security refers to the protection of servers and the data they host from unauthorized access, cyberattacks, and other vulnerabilities. Key practices include firewall configuration, intrusion de
Escalation Icon
Vulnerability Icon
Patching Icon
Hardening Icon
Patch Icon
Hardening Icon
50 cybersecurity icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Botnet Icon
Exploit Icon
Vulnerability Icon
Exploit Icon
Exploit Icon
Vulnerability Icon
Honeypot Icon
Zero Day Icon
Zero Day Icon
Vulnerability Icon
The Impact of Cyberbullying
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple flat vector illustration.
Parental Conflict and Child Impact
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Next page
/ 10