Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
malware, online scam, virus in computer vector icon
Sql Injection
Identity management blue gradient concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Myriad Pro-Bold font used
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
fishing identity theft icon sign vector
Print
Risk Icon
Collection of shield icons, representing protection and security.  Various states of the shield, from intact to broken, symbolize vulnerability and resilience.
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Hacker Solid Black Icon
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Certified Ethical Hacker - CEH - icon set & web header banner
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Security Testing Icon
Hooded Programmer Analyzing Code On Computer Screen For Cybersecurity Solution
Analytics Icon
Various icons representing different human emotions and mental states depicted in a simple, monochromatic style for educational purposes
malware, cyber attack or virus line icon
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Risk management and financial business danger evaluation tiny person concept, transparent background.
Risk management line outline icon
Risk management process, business vector concept
Cyber Threat Icon
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Cyber attack and security threat concept. Hand holding phone with error message, virus warning, and spam alert. Hacking, network failure, data breach, malware, phishing danger vector.
Security shield icon set with lock star checkmark bolt broken and keyhole featuring black and white symbols
Vulnerability Assessment Icons. Outline icon set of vulnerability assessment methods: CVE database, risk matrix, asset inventory,
Data Breach Icon
unlocked computer access icon sign vector
Data Center Security Cloud Server Protection with Technicians.
Vulnerability Assessment Icons. Isometric Flat icon set of vulnerability assessment activities: vulnerability scanner, CVE
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Security pursuit showing a thief running away with a password being chased by a policeman, illustrating data protection and cybersecurity.
Vulnerability Tools Icons. Outline style icons of Vulnerability Assessment Tools: vulnerability scanner radar, CVE list sheet,
Rhino in Sepia: A powerful rhino stands boldly in its natural habitat, rendered in a sepia tone, against an illustrative background that captures the essence of the wild.
Social Vulnerability Icons. Outline icon set of social vulnerability factors: income gap bar, elderly figure, single parent icon,
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Sad girl expressing vulnerability in digital illustration, emotional awareness
Bugs Icon Set Multiple Style Of
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
Hands holding a tablet with bugs crawling on it representing software errors or vulnerabilities on device
Cyber Attack Solid Black Icon
Securing Digital Identity Role: User Access Governance In Cybersecurity Management
Sensitivity Icon
Disruption Icon
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Data Breach Icon
Bug detection software debugging code error computer virus malware security vulnerability analysis tool
an elderly woman coughing with virus particles spreading in the air. The image highlights health risks, virus transmission, and vulnerability of seniors to infectious diseases. Suitable for healthcare
Vulnerability Icons Grid. Solid, filled icon set of vulnerability and openness: open door, exposed heart, eye with tear, light
Security and threat vector icons illustrating digital safety and vulnerability issues
Cybersecurity Icon Set. Solid, filled icon set of proactive cybersecurity measures: penetration test, vulnerability scan, security
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Vulnerability Tools Icons. Outline style icons of Vulnerability Assessment Tools: vulnerability scanner radar, CVE list sheet,
Patch software. Operating system updates that address security vulnerabilities
Social Vulnerability Icons. Outline icon set of social vulnerability factors: income gap bar, elderly figure, single parent icon,
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Anxious South Asian woman expressing concern, emotional vulnerability
Virus warning pop-up on desktop shows threat, indicating potential system failure. Computer screen displaying virus warning pop-up on desktop highlights online dangers, system vulnerabilities
Woman Working On Patch Management At Home With Laptop Technology Solutions
Hacker trying to break into a website security system with skull
password fishing attempt icon sign vector
Database breach icon with a cracked server symbol representing a data leak damage or security system vulnerability A vector for hacking risk and information loss
Cracked ground, a sign of vulnerability and environmental damage.
Disruption Icon
Security Pipeline Icons. Isometric Flat icon set of security in deployment pipeline: static code analysis, vulnerability scan,
Data Breach Icon
Collection of white security icons displayed on a black background, representing protection and safety.
Cartoon vector illustration of a sad woman sitting with knees drawn up, symbolizing emotional exhaustion and vulnerability against dark background
Vulnerability Icons Grid. Solid, filled icon set of vulnerability and openness: open door, exposed heart, eye with tear, light
Security Testing Icon
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Broken shield icon black and white vector sign
Hacker with laptop stealing personal data and financial information. Cyber security and internet privacy concept. Phishing attack, malware, virus, cybercrime, and network security.
Dramatic concept of a wing struck by lightning highlighting power and vulnerability
The evocative portrayal of a girl with a cracked face, a poignant exploration of vulnerability and resilience. The grayscale image conveys a sense of delicate fragility.
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Sad child standing in the rain, expressing vulnerability
Cloud outline with a bug icon, conveying technological vulnerabilities and malware risks. Ideal for cybersecurity, cloud computing, data protection, technical issues, digital risk, IT maintenance
Hacker in a mask
Crying child with teddy bear sits amidst rubble, expressing deep emotion in a minimalistic setting, evoking feelings of loss and vulnerability with copy space
Cyber Security Guard Shielding System Against Threat Vulnerability Attack
Silent Contemplation: A silhouette of a woman deep in thought, captured in a moment of introspection, her posture revealing vulnerability and the weight of contemplation.
System Vulnerability Icon
Disruption Icon
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Data Breach Icon
Penetration Testing Icon
Cartoon vector illustration of a sad woman sitting with knees drawn up, symbolizing emotional exhaustion and vulnerability
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Red arrow hitting the target, depicting security threats and data breach concepts, with focus on vulnerability and protection
Login Password Laptop Composition
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Next page
/ 10