Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Exploit Icon
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Security Testing Icon
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Detection Icon
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
Mutual Support Giving up seat in public transport -modern flat vector concept illustration of man offering his seat to elderly woman on bus A metaphor of voluntary, collaborative exchanges of services
Vector hand drawn cartoon illustration of a green dragon monster mascot character, sword and fly swatter in hand, protecting computer from bug virus malware attack
Protection background. Technology security, encode and decrypt, techno scheme
Camping Bundle. Refugee Camp Tents Collection Illustrations
A man holding a red heart in his hands with a concerned expression in a flat vector illustration depicting emotional vulnerability and introspection
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Security Risks Icon Style
Vulnerability  Icon Set Multiple Style Collection
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Two people fixing cybersecurity issues on a large screen with charts, warning signs, and hacker icons. Digital security and system maintenance concept. Vector illustration
Achilles' Heel
Computer security specialist online service or platform set. Idea of digital
Exploit Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Protección de las personas mayores o tercera edad.
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Vulnerability Icon
Shield Slash Outline Icon
Young Woman Seeing Herself Worthless, Failure And Smaller Than She Really Are. Low Self-Esteem Concept. Vector Flat Cartoon Illustration. Sad Woman Feeling Low Confidence In Her Abilities.
Penetration Testing Icon
 Icon of Vulnerability for Security Management
Camping Bundle. Refugee Camp Night Collection Illustrations
vulnerability line icon
Insider Threat Icon
Detecting Malware and Viruses: Cybersecurity Threat Concept with Bug on Computer Screen, Alert Sign, Padlock, and Website Interface Vector Graphic for Network Protection.
Computer Outage, System Failure, Software Error, and Cyber Attack Disruption Concept
Cyber Risks Icon Style
Vulnerability Outline Color Icon
Black Silhouette of a Hedgehog – Rounded Body with Spiky Back, Sharp Quills, Small Face, and Tiny Legs, Symbolizing Cuteness, Nature’s Resilience, and the Innocence of Forest Wildlife
A dark silhouette of a damaged house with visible cracks and an orange explosion emanating from its side
Financial bug or vulnerability icon, insect with dollar sign symbol. Software flaw impacting money graphic, coding error or exploit in finance system illustration.
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Exploit Icon
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
A shadowy figure, digitally manipulated, symbolizes the hidden perpetrator of cyberbullying, highlighted by a single spotlight.  Illustrate the vulnerability of the victim.
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Decryption Icon
Sad boy holding teddy bear in yellow shirt and blue pants vector illustration
Threat icon
Risk Icon
vulnerability
Camping Bundle. Abandoned Factory Remnants Collection Illustrations
Vulnerability Icon
malware, cyber attack line vector icon
3D Cartoon Ecology Metaphor
Protection background. Technology security, encode and decrypt.
Market Data Icon  in black line style icon, style isolated on white background
Security Outline Color Icon
Security vector illustration word cloud isolated on a white background.
Vector light Risk management process diagram schema
Broken security shield icon, vulnerability or system breach symbol. Damaged protection and compromised safety graphic, cyber attack or failure illustration design.
Abstract technology security global network background, vector
Hacker in the Shadows: An anonymous figure in a hooded sweatshirt intensely focused on a computer, symbolizing cybersecurity threats and digital crime in the digital realm.
 Comprehensive Vulnerability Scanner Icon
shield X line icon
Abstract symbols flat design long shadow glyph icons set
Eavesdropping Icon
Cybersecurity threat concept. Hacker phishing for sensitive data from server. Data breach and cybercrime illustration. Security vulnerability, malware attack, and internet fraud.
A woman trapped within a complex, chaotic web of tangled threads symbolizing deceit and lies.  Her expression conveys vulnerability and despair.
Penetration Testing Icon
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Camping Bundle. Apocalyptic City Destruction Collection Illustrations
Maintenance smartphone technology search system
Threat Icon
Trapped and Needing Help
Criminal Assault Threat Icon
Exploit Icon
51 Attack Outline Icon
vulnerability
email with virus, phishing vector icon
Brute force attack icon, hammer and keyhole symbol. Exploiting security vulnerability graphic, system penetration or data breach tool illustration for cybersecurity.
Cloud computing security breach for internet of things
Vulnerability Icon
Sad boy crying holding teddy bear in yellow shirt vector illustration
Exposure Icon
Broken link RGB color icon. Hyperlink that no longer points to its original destination. Error in webpage working process. Isolated vector illustration
Exploit Icon
Disempowerment Glyph Blue Grey Icon
Sql Injection
Online Robbery Icon
Risk Management Icon
Camping Bundle. Apocalyptic City Destruction Collection Stickers
image of a sad girl
A darkhaired man embracing a blonde tearful child suggesting comfort or consolation
A minimalist sketch of a figure sitting in a posture of sadness and isolation.
Risk Icon
1045 - Data Leak Concept Illustration
Parental Conflict and Child Impact
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Compromised shield icon, security failure or data breach symbol. Broken protection and system vulnerability graphic, unsuccessful defense or attack illustration.
Firewall Breach Vector Illustration Concept of Network Security Attack
Next page
/ 10