Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
set of distressed black padlock icons symbolizing security and vulnerability in access control
vulnerability flower, bold style black Hand drawn set collection , white background , vector isolate
Digital Fortress Under Siege: A conceptual depiction of cybersecurity, showing a shield fractured by a cyberattack, emphasizing the vulnerability of digital data.
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Emotional vulnerability. A character gently opening up through floating speech bubbles with simple symbols, representing honest expression.
Security Testing Icon
Woman Depressed, Hands Covering Face, Red Background, Anxiety, Stress, Sadness, Burnout, Mental Health, Emotional Pain, Depression, Vector Illustration , vector style simple color
Weakness Outline Icon
Cybersecurity issue icon
Exploit Icon
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Security Scan Icon
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Cracked shield with lightning bolt and circuit board elements on dark background symbolizing cyber security breach or vulnerability
Penetration Testing Icon
Protection background. Technology security, encode and decrypt.
Cybersecurity Network Protection Diagram with Central Lock Icon for Data Security and Digital Privacy Compliance
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Magnifying glass searching for viruses, malware, software bugs
malware, cyber attack line vector icon
vulnerability flower, 6 black delicate line drawings vector set collection , white background , PNG and SVG
Isometric cybersecurity icons with warning symbols in vector art
Online Robbery Icon
Threat Detection icon set multiple style collection
A hacker exploiting vulnerabilities in interconnected digital systems and devices Vector, illustration
Financial distress concept highlighting credit risk, insolvency exposure, and systemic vulnerability across economic cycles. in Lineal Icon Style
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Cybersecurity related editable icon set. Contain icons related to data protection, internet security, privacy, firewall, encryption, secure network, hacking protection, and more. Editable stroke.
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
System threat detection and digital data vulnerability search concept.eps
Risk Icon
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Login Password Laptop Composition
Risk Blue And White Icon Style Collection
Icons representing various types of cybersecurity threats and vulnerabilities
Quiet Vulnerability. Facing a personal crisis with vulnerability. A single character sitting quietly with head slightly lowered, surrounded by soft abstract
Nature's Fragile Balance. Threatened habitats. Forest and ocean fragments breaking into abstract shapes,
Striking graphic portraying a person's inner emotional turmoil and concealed vulnerability
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
vulnerability flower , realistic line art vector set , white background , PNG and SVG isolate
Hearing loss concept. Human ear disease or disability. Deaf person
Broken shield icon simple vector isolated symbol
spectre and meltdown email spyware virus attack vulnerability vector illustration
Penetration Testing Icon
Broken chain padlock icons collection representing security breach and vulnerability
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Simple set of vulnerability related filled icons.
Programmers and IT Specialists at Work: A collection of illustrations detailing development workflow, troubleshooting, collaboration, and success.
Technology Lock Security,protection and Safe Concept,on Global background Hi-tech and technology concept design.
Honeypot Icon
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
vector icon of a document with a shield with a blue background in the shape of a shield
unprotected
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Software security vulnerability assessment using robots and professionals
Risk management line outline icon
Risk Assessment Icon Set Multiple Style Collection
user protection icon sign vector
Outline Hacker Attack. Isometric Cyber Security Concept.
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Vulnerability Icon
Certified Ethical Hacker - CEH - icon set & web header banner
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Network Vulnerability, Vulnerable Smart Devices - IT Security Concept Design, Vector illustration
Antivirus software searching for viruses, malwares and vulnerabilities.
Abstract technology security on global network background, vector illustration
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
malware, cyber attack or virus line icon
vulnerability search icon. Vector illustration
System administrator online service or platform set. Technical work with server
Risk Icon
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Young people helping erderly at the bus stop. Blind man with guide dog, old woman with a cane, elderly man in a wheelchair. Social helping concept. Vector illustration.
Weaknesses icon set in line and glyph style on black and white background
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
computer cyber security icon sign vector
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Cybersecurity vulnerability black glyph icon. System weakness and flaw. Cybercriminal gains access. Errors exploitation. Silhouette symbol on white space. Vector isolated illustration
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Next page
/ 10