Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Login Password Laptop Composition
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Csrf Icon Multi Color Vector Illustration
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Vulnerability Management and analysis security hacker
spectre and meltdown email spyware virus attack vulnerability vector illustration
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Threat Assessment Icon
vector icon of a document with a shield with a blue background in the shape of a shield
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
security breach alert
Honeypot Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
unprotected
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Risk management line outline icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Risk Assessment Icon Set Multiple Style Collection
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Vulnerability Icon
Computer Programing icon collection set. Containing performing, cpu, computing, integration, testing, analysis, generating, algorithms, hardware and debugging icon. Simple flat vector.
Security Breach Icon
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Disruption Multistyle Icon Set
Modern minimalist line icons for cyber security, data protection, and internet privacy, ideal for secure digital technology and online safety infographics
Cybersecurity threat concept with syringe injecting malware into computer chip, data breach risk, digital attack, virus protection, vector design element
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Risk  Icon Set Different Style Collection
A collection of hacker-themed outline icons, showcasing technology and cybersecurity elements.
malware, cyber attack or virus line icon
vulnerability search icon. Vector illustration
Risk Icon
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Icono escudo alarma color FB reflejo
computer cyber security icon sign vector
This graphic features a hooded hacker figure alongside binary code, a broken padlock, a terminal window, and a warning sign to showcase data security issues.
Safety pin with heart
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Hooded figure using ai robot laptop symbolizing artificial intelligence in cybersecurity, hacking, and data threats
Supply Chain Risk Icon
Line art illustration of a broken chain depicting disconnection for concepts of vulnerability
*Stamp11
Cybersecurity Icon
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Security warning shield indicating a potential threat or vulnerability
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Crime scene on a laptop
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Cloud computing concept. Cloud shapes and a sad face data loss, connectivity issues, or digital frustration. Cloud technology, downtime, or vulnerability in tech. Ideal for tech troubleshooting, data
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
Man stealing chip and running away. Hacker stealing technology. Concept of data breach, file hacking, computer security vulnerability, or cybercrime. Vector illustration
Data Breach icon set multiple style collection
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Programmer at work. Computer assisted design, developer testing program.
Bug Icon
Hooded figure using ai robot laptop symbolizing artificial intelligence in cybersecurity, hacking, and data threats
Risk Assessment Icon
vulnerability line icon
Set of six minimalist warning icons simple flat vector design element isolated on white background
Vulnerability Logo Variations. Facing a personal crisis with vul
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Cybersecurity concept warning on hacker laptop
cybersecurity breach risk featuring a blue shield and red downturn arrow for illustrating financial market decline and data vulnerability impacts.
Earthquake damage icons show cracked buildings collapsing structures illustrating seismic activity destruction risk and urban vulnerability
Collection of safety and warning symbols
risk management asset vulnerability assessment concept
Risk management process, business vector concept
Ethical hacker. Character conducting a security penetration test. White
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Digital network security shield icon representing data protection, cybersecurity, and technological defense against online threats and vulnerabilities
Illustration depicting a person in fetal position expressing despair and vulnerability showcasing mental health concept in a minimalistic style
Ethical Hacking Icon
Mitigation Plan Icon Collection and Simple Concept Outline Color, Containing: Climate Change,Green Environment,Evacuation Plan,Ecology,Reduction,Notification,Community,Task List,Disaster Recovery
Comprehensive risk assessment dashboard with vulnerabilities and incident reports visualization
Hands cradle a melting planet, symbolizing environmental vulnerability and care
Hooded figure using ai robot laptop symbolizing artificial intelligence in cybersecurity, hacking, and data threats
Illustration of a single clear and pristine teardrop, conveying purity and symbolizing freshness or emotional vulnerability against a white backdrop
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Hooded figure using ai robot laptop symbolizing artificial intelligence in cybersecurity, hacking, and data threats
Computer security specialist online service or platform set. Idea of digital
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Next page
/ 10