Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Protection background. Technology security, encode and decrypt, techno scheme
Trustworthy and honesty to believe in work together, integrity or trust for partnership, support and reliable to help success together concept, businessman acrobat hold hand tight by trusted partner.
lock With Keyhole on digital data background
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Sign of Meltdown and spectre vulnerability on notebook monitor
Certified Ethical Hacker - CEH - icon set & web header banner
Exploit Icon
Vulnerability Icon
Exposure Icon
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Webpage error notification concept, data vulnerability and risk
Abstract technology security on global network background, vector illustration
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Vulnerability Icon
Risk icon sheet multiple style collection
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Vulnerability text with decimal number background
Ethical hacker. Character conducting a security penetration test. White
Security Vulnerabilities Blue Icon
A lock within a shield symbolizes security and protection. Ideal for apps or websites focused on data privacy, cybersecurity, or password management. Use for secure login or vault features.
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Deteriorating Financial Performance: Risk of Economic Decline and Instability
handicap
AI in Cybersecurity abstract concept vector illustrations.
A woman sitting on a bed hugging a pillow while wearing blue pajamas in a flat vector illustration showcasing feelings of contemplation and vulnerability
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Decryption Icon
Vulnerability Vector Design
Insecure Icon
Risk Icon
Penetration Testing Icon
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Vulnerability Icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Shield Slash Outline Icon
Risk Factor Blue Black Icon
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Vulnerability  Icon Set Multiple Style Collection
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Security web icons showing 15 cybersecurity symbols. Suitable for website, app, and graphic designs related to online security measures.
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
document security icon sign vector
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Threat Icon
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
Black line icon for Vulnerability
Security Breach Icon
Risk Factor Glyph Blue Grey Icon
ai cyber security icon sign vector
Internet services icon collection set. Containing server web, features, higher support, authentication mechanisms, anonymous, basic access, digest icon. Simple flat vector.
Cloud hacking or unauthorized access, cloud security or data breach, cloud vulnerability or cyberattack, cloud encryption or data protection, hacking attempts or cybercrime, cloud-based systems
Ocean acidification process.chemical equation and consequences
Penetration Testing icon vector image. Can be used for Business Audit.
Bug fixing doodle for improve website performance
blonde woman delicately covers her eyes conveying a sense of vulnerability against a muted cityscape backdrop.
A senior citizen receives a COVID-19 vaccination, highlighting healthcare workers' dedication and the elderly's vulnerability to the virus.
Cyber Threat Icon
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Honeypot Icon
Vulnerability Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
A woman trapped within a complex, chaotic web of tangled threads symbolizing deceit and lies.  Her expression conveys vulnerability and despair.
Unsafe Icon
Man wielding sledgehammer near shopping bags and wireless icon. Ideal for digital disruption, online security, data breaches, e-commerce challenges, hacking, modern retail, cyber vulnerability
Solid black icon for Vulnerability
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
Security Vulnerabilities Flat Icon
Software bug or coding errors, system malfunction or software crash, performance issues or application slowdown, data corruption or file errors, security vulnerability or exploit, coding mistake or lo
Programmer at work. Computer assisted design, developer testing program.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
password leak out and got data breach to hacker
Risk management line outline icon
Computer Problem User Composition
System Vulnerability Icon
Icono escudo alarma color FB reflejo
Breach Icon
Cyber or web security online service or platform set. Digital data
Vulnerability Assessment Icon
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Vulnerability Icons
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
A shadowy figure, digitally manipulated, symbolizes the hidden perpetrator of cyberbullying, highlighted by a single spotlight.  Illustrate the vulnerability of the victim.
A warning sign indicating a data breach, featuring an exclamation mark and bold text highlighting the term "DATA BREACH.
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
IT risk glyph icon
vulnerability cyber security system illustration lock symbol circuit broken
Security Vulnerabilities Outline Icon
Next page
/ 10