Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Security Vulnerabilities Flat Icon
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Penetration Testing Icon
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Cybersecurity vulnerability illustration. Data breach concept. Stressed woman, broken padlock. Hacking, system failure, online threat. Password compromised. Information security risk. Privacy.
Data breach and information leakage after cyber attack tiny person concept, transparent background. Hacking threat and privacy danger after connection vulnerability illustration.
Isometric flat vector icons of Cyber Defense Systems: honeypot decoy server, digital breach simulator, perimeter security layer, vulnerability scanner tool, security event log viewer, breach
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Bridges of Connection Two figures standing on opposite sides of a gap connecting with a glowing bridge made of hearts. This illustrates how vulnerability can bridge emotional
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
virus alert laptop icon sign vector
patch update line
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Vulnerability Icon
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
an elderly woman coughing with virus particles spreading in the air. The image highlights health risks, virus transmission, and vulnerability of seniors to infectious diseases. Suitable for healthcare
Illustration of open mouth with inner lip cut, exploring vulnerability
Cyber Threat Icon
lock With Keyhole on digital data background
Cybersecurity vulnerability concept. Shocked woman, broken padlock illustrating data breach, hacked account, password compromise. Internet security failure, online privacy risk, identity theft alert.
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Vector illustration of secure software development life cycle showing code audit, vulnerability testing, and signed deployment
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
Sign of Meltdown and spectre vulnerability on notebook monitor
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Flat illustration of woman managing IoT security internet of things protection
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Computer Problem User Composition
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Security Vulnerabilities Outline Icon
Abstract technology security on global network background, vector illustration
Ill Buffalo: A sick buffalo, depicted with a thermometer and ice pack, embodies a sense of vulnerability and the need for care.
Ethical hacker. Character conducting a security penetration test. White
A distressed bunny rabbit, sporting bandages, with a hidden knife subtly positioned behind its back.  Depict a sense of vulnerability and hidden danger.
Cyber Threat Icon
patch update solid
Bug fixing - patch updates for improve performance
Risk Icon
Vulnerability text with decimal number background
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Flat Illustration Business Team Meeting, Project Planning, Data Analysis, and Strategic Collaboration
Mental Health Awareness: A stark graphic illustrates the complexities of mental health challenges, symbolized by an iceberg, with the visible tip representing awareness.
Vulnerability glyph color icon
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Digital security icons representing various aspects of cybersecurity protection and vulnerabilities in a seamless pattern design
Data Breach
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Protection background. Technology security, encode and decrypt, techno scheme
Bitcoin wallet virus concept cryptocurrency security breach digital finance cyber attack blockchain vulnerability one
Crime scene on a laptop
Penetration testing tools isometric set. terminal window with code, command line cursor, password brute force icon, IP scanner tool, vulnerability
vulnerability woman mirror fear vector
System Vulnerability Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
vulnerability vector outline icon on white or transparent background
Icons of Openness. Outline icon set of vulnerability and authenticity: open heart, mask removal, tear drop, fingerprint, mirror
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Threat Icon
*Stamp11
Penetration Testing icon vector image. Can be used for Business Audit.
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Illustration of open mouth with inner lip cut, exploring vulnerability
Risk Assessment Icon
Cybersecurity Defense Against Digital Threats: A Firewall Shielding Business Professionals from Malware and Virus Attacks.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Broken chain link with shield icon symbolizes security breach or vulnerability
broken padlock glyph icon
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
A mother shields her child from a fierce wind, conveying vulnerability and resilience. Dramatic illustration with a muted color palette. Evokes emotion and urgency.
Penetration Testing Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Vulnerability Vector Design
傷ついた盾のシンプルなイラスト
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
handicap
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
System administrator online service or platform. Technical work with server
Penetration Testing Icon
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Security Audit Icon
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Next page
/ 10