Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Conceptual Illustration of Digital Security and User Authentication Process.
Emotional risks interpersonal scene where a person hesitates to express feelings to a friend while small sparkle and line icons emphasize vulnerability,
Security Engineering icon set. Testing, Firewall, Monitoring, Disaster Recovery, Training, Data Protection, Analysis, Vulnerability. Duotone color solid and editable outline icons
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Targeted security shield icon: precision protection and vulnerability defense vector
Flat Illustration of a Man Picking a Door Lock Representing Security Vulnerability and Cyber Crime
A person embracing vulnerability, sharing their feelings with a friend. Icon set. Set Logo of A person embracing vulnerability, sharing their feelings with a
Focused Hacker Analyzing Data on Multiple Screens in Dark Room.
Digital security shield with padlock icon and circuit board pattern.
Hacked System Broken Padlock Cyber Security Banner
Online Robbery Icon
Graphic illustration of numerous human figures falling or floating in space
Poet on stage. A single speaker standing at a microphone, reading from a notebook under soft spotlight accents. The scene conveys focus, vulnerability, and
padlock Line Gradient Icon
Isometric Cybersecurity and Malware Scanning Concept Illustration for Data Protection and Information Security Audit
Stylized Line Art of Person Bound with Rope, Blindfolded
Computer software debugging concept showing magnifying glass inspecting website on laptop to find and fix security vulnerabilities.
Emotional risks romantic confession concept where a person nervously expresses feelings while tiny sparkle and star icons highlight vulnerability, courage, and
Cybersecurity protection concept with a person working on a computer, shielded from threats by a digital security shield and connected network elements, illustrating data safety and online privacy
Conceptual illustration of data security, protection, and privacy measures.
Inner emotional crack depicted by a seated figure with subtle fissures in the silhouette, tiny floating shards and stars suggesting vulnerability, reflection,
Security shield icon with an open padlock symbol representing vulnerability and access
Broken document file data loss and security alert warning sign icons with document security corruption information vulnerability protection computer internet software critical notification
Sharp thorns symbolize pain, struggle, and sacrifice against a clean background
Isometric illustration of a man experiencing a defamation campaign.
Cybersecurity vulnerability scanner and risk assessment console icons
Cybersecurity Data Breach Illustration with Broken Shield, Warning Icons, and Data Leak Symbols
Cyberattack concept: hackers breach computer security, steal data, and spread virus
Cybersecurity icons: cracked shield with bug for zero-day exploit and question mark in circle with padlock for unknown vulnerability with exploit icon with line art with data breach with danger sign
Digital Security Shield - Protecting Online Data and Information.
A silhouette of a man carrying a woman in his arms against a white background
Terrified person hiding under blue blankets in bed at night
Person peeking from behind a sad theatrical mask
Cybersecurity icons: password cracker, network scanner, ddos, malware, firewall bypass
Cybersecurity, hacking threats, data breaches, cloud computing, online security, digital risks. Geometric Trojan horse with cloud and data arrows. Cybersecurity and hacking threats concept
Hands cradling a cracked piggy bank, representing financial vulnerability
Risk Blue And White Icon Style Collection
A person embracing vulnerability, sharing their feelings with a friend. Icon set. Set Logo of A person embracing vulnerability, sharing their feelings with a
Isometric Illustration of Software Testing and Debugging Process.
Conceptual illustration of database security, data protection, and server architecture.
Isolation and Emotional Cornering Icon
Anonymous figure using a laptop with a security shield display
Vulnerability Icon
A person embracing vulnerability, sharing their feelings with a friend. Icon set. Set Logo of A person embracing vulnerability, sharing their feelings with a
Cybersecurity risk assessment and vulnerability management process illustrated with isometric diagrams and people interacting with data.
Human silhouette with a shattered heart graphic illustrating emotional pain and vulnerability on a stark white background, symbolizing inner turmoil.
Conceptual Illustration of Security and Protection Symbols for Privacy.
vulnerability icon
Negative emotion and mental health glyph icon set for stress, anxiety, depression, and psychological wellbeing awareness design
Emotional risks workplace scenario where a person hesitates to share ideas with colleagues while small sparkle and line icons emphasize courage, vulnerability,
Cybersecurity measures to protect against various digital threats and vulnerabilities Vector
Advanced AI Safety and Cybersecurity Concept Set: Illustrating Prompt Injection Attacks, Neural Network Transparency Analysis, and Multi-Layer Defense Filtration for Secure Machine Learning Systems.
Threat Response strategy preventing phishing, analyzing risks, testing vulnerabilities, and protecting against malware attacks
Set of four warning icons displaying different types of system errors
Cybersecurity, DDoS attacks, network vulnerability, internet threats, wireless communication, online safety. wireless symbol, person analyzing data rockets labeled DDoS. Cybersecurity and DDoS
Man running with keyboard and shield representing cybersecurity.
Cybersecurity training session in a modern office setting with employees learning about data protection and network security protocols
A black, broken padlock against a white background, symbolizing vulnerability or breach
Diverse collection of cybersecurity concept line icons representing digital security, data protection, biometric authentication, network integrity, and vulnerability management
Risk Icon
Isometric Data Security Cube with Padlock and Cloud Connection.
From vitality to vulnerability illustrating the profound difference between healthy and unhealthy lung conditions and their human impact
Cyber Crime icon set. Includes phishing attack, computer virus, data breach, spam email, cyber security. Editable stroke line icons.
Emotional risks friendship conflict concept where a person hesitates to speak to a friend while tiny sparkle and star icons highlight vulnerability, honesty,
Cybersecurity Icon Set – Vector Collection for Data Protection, Threat Prevention & Risk Management
Risk Icon
A large hand reaching out in a threatening gesture towards a small silhouette figure, emphasizing a moment of danger and vulnerability in this striking vector illustration graphic design.
Comprehensive security solutions and services
Bug Bounty Program on Computer Screen. Vector Illustrations. EPS Editable
Intricate Network of Digital Security and Data Protection Concepts.
Stylized computer bug icon representing a software vulnerability or cybersecurity threat
Cyberattack on a fortified server room with shield and hackers
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Human emotions ? sadness and reflection. Character with lowered posture and muted emotion symbols, expressing vulnerability and introspection. Calm, respectful
Shield icon, mental health symbol, emotional wellness logo, vulnerability concept
Contrast of protection and vulnerability depicted by hands holding shields
Emotional risk concept: Diverse people holding hearts and packages, symbolizing vulnerability and trust in relationships
Business team identifying a vulnerability point on a strategic network map, planning and risk management concept.
Broken chain link representing weakness and vulnerability in a simple line art drawing
Digital Shield with Padlock Symbol Representing Cybersecurity and Data Protection.
Cracked Shield Icons Set with Lightning for Security Breach, Damage, and Vulnerability Symbols
Cyber Security Icons Set: Data Protection, Hacking, Network Threat, Malware, Lock, Search Stock Media
Illustrative comparison of online security and data privacy for protected users versus tracking and vulnerability for digital information
Cartoon stick figure looking scared and overwhelmed by many hands pointing fingers of blame and accusation from all directions.
Student struggles with peer pressure and social anxiety, isolated by haunting shadows of bullying in a classroom, depicting emotional distress
Heart privacy and emotional protection concept showing a padlock keyhole inside a heart shape.
Hacker, code, lock, warning, and network symbols highlight cybersecurity threats
Minimalist vector icon of an closed padlock. Represents security access, vulnerability, data freedom, or privacy settings. Bold black and white circular silhouette for UI/UX design. (187 chars)
Woman sitting, head in hands, surrounded by barbed wire, seeking escape
Three variations of a broken heart with a sword black orange and red tones
Illustration of Cybersecurity Professionals Working on Data Protection.
Abstract silhouette of person curled up in a fetal position.
Conceptual illustration showing cloud security vulnerabilities with a knife pointing towards a tent inside a cloud icon.
Cyber Security Shield Logo with Digital Lock Icon.
Digital Shield Protecting Online Data and Information with Checkmark.
Cybersecurity support line icon set with threat detection firewall identity protection vulnerability response editable outline vector collection security systems
Abstract illustration of data breach or cyber attack on digital system, depicted as cracked geometric rock with virus spreading.
Phishing Icon Different Style Outline Collection Set Vector Illustration
An illustration of a broken chain in black and white, symbolizing disconnection and vulnerability
Contrasting depictions of a padlock symbolizing security and vulnerability
Next page
/ 10