Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
risk Two-tone version in black and white background
Cybersecurity, threat detection, software vulnerability, malware analysis, digital safety, bug tracking. A magnifying glass focusing on a bug beside an alert triangle. Cybersecurity and threat
Damaged old iron fence showing security problem
Cybersecurity line icon set. vector pictograms of protection, shield, virus, phishing, and vulnerability, thin outline illustration.
Cybersecurity Specialist Investigating Data Protection With AI Powered Security Network
Broken shields show vulnerability and represent failure,Broken shield icons in bold and outlined styles.Broken Shield icon - vector. Security Shield icon in flat style. Symbols of broken protection.
Flashing Red Emergency Siren with Yellow Light Rays.
Social vulnerability icon set, diverse population symbols, support group graphics, healthcare and policy visuals, inclusion and equity design elements
Risk Analysis Icon Banner
Leadership Vulnerability Icons. Leadership vulnerability. Line icon set of leadership vulnerability: heart, shield, open hand, human head, speech bubble,
Three hooded hackers working together on laptops in the dark
Vulnerability  White Icon Set Design
vector banner of cyber resilience framework in creative flat design suitable for web banners business presentations online articles cybersecurity awareness materials digital transformation visuals
Threat Detection icon sheet multi style collection
Malware infection on document causing software security vulnerability concerns
Abstract illustration of three hooded figures in dark blue tones
Cyber risk assessment icon illustrating vulnerability analysis and security posture management.
Weak link. Broken chain or weakness concept. Broken or unleashed black chain like freedom icon. concept of lost control sign or system vulnerability or security risk. Vector illustration
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Security checklist and shield icon representing data protection and policy compliance
risk multiple style collection
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Cybersecurity concept with people working on data security and privacy protection
Vulnerability. Outlined stroke vector icon with black-filled details.
A programmer or IT specialist analyzes a database, finding a critical error, threat, or system vulnerability with a magnifying glass
Threat detection vulnerability scan security risk assessment icon vector eps silhouette
Set of mitigation Icons or symbols Vector fully editable file.
Broken metal fence barrier creating gap
Cybersecurity shield with lock and circuitry
Risk icon sheet multiple style collection
Website security vulnerability illustration showing software bug detection
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Crisis Emblem Logo Variations. Facing a personal crisis with vul
Broken chain link vector illustration set representing disconnection and vulnerability
Cyber Risk Exposure Icon Set containing cyber hygiene, data sensitivity, threat landscape, regulation, vulnerabilities and third-party risk vector icons
Businessman shielding from rain near falling dominoes representing risk and protection
Hand-drawn black and white sandcastle is about to be destroyed by a giant crashing ocean wave in a dramatic sketch style illustration showing impermanence and vulnerability
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Abstract Hacker Hooded Mask logo
A broken metal chain link vector illustration with a textured black and white design. It highlights vulnerability and strength through its fragmented background.
A vibrant red heart rests upon a fractured surface, symbolizing heartbreak, emotional damage, or vulnerability in relationships.
Crisis Door Logos. Facing a personal crisis with vulnerability.
Target on a person's head, symbolizing threat or danger
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Searching for system errors and vulnerabilities icon set | Magnifying glass over alert symbol security audit vector | Troubleshooting and bug finding search vector illustration |
Risk Assessment Icons. Line style icons of risk assessment tools: risk matrix chart, likelihood vs impact icon, vulnerability
A minimal set of 24 solid glyph icons representing cybersecurity, data privacy, and network protection concepts for technology
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Risk Assessment Icon
Faded hope a sunflower seeking light from an artificial lamp, depicting nature's vulnerability
Large set of outline vector icons for cyber security, data protection, digital safety, insurance, and system vulnerability symbols.
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Emotional Icon Array. Emotional Expression Collection linear icon set: joy burst, sorrow drop, compassion flame, gratitude beam, vulnerability symbol, calm breeze, open gesture
Global supply chain disruptions impacting business operations and financial stability worldwide
Risk Icon
Abstract cyber security hackers with laptops and data flowing
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Cartoon tree bending under strong winds, illustrating nature's power and climate change vulnerability
Broken padlock icon in flat blue style on white background
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Broken cross symbols in four colors on white background. Cracked   shield with a white medical cross. Flat vector icon symbolizing health system failure, weak immunity, or medical vulnerability.
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Decaying shield on red, symbolizing data loss. For cybersecurity, privacy or vulnerability awareness
Cybersecurity Icon Set. Cybersecurity Shield Set linear set: firewall barrier, encrypted lock, secure cloud, threat radar, data vault, vulnerability scan, intrusion alarm, malware
Distressed and fractured circle design representing vulnerability and fragility symbol
Stylized broken heart drawing on pale pink backdrop represents vulnerability
A collection of hacker-themed outline icons, showcasing technology and cybersecurity elements.
Safeguard your data with robust cybersecurity solutions, ensuring comprehensive protection against online threats and vulnerabilities in a digital age of evolving risks
Cyber security and network defense line icon set. Vector pictograms of firewall, encryption, phishing, and vulnerability analysis, thin linear illustration.
Symbolic illustration of a fractured shield with a silhouette of a person behind it representing vulnerability and broken protection against adversity
DDoS Attack icon set. Laptop with Bug and missile Attack Icon. representing software vulnerability and hacking. vector illustration on white background.
Vulnerability Icon
Understanding the Continuous Cycle of Effective Risk Management Processes From Identification to Monitoring
Broken hacked Wi-Fi router with cracked screen and scattered objects around it illustrating cybersecurity failure and technology vulnerability
Cybersecurity vulnerability scan vector finding weak point in system
Vulnerability icon with white background vector stock illustration
Black Solid E-Commerce Security Vulnerability Silhouettes Set of Six on White Background
Shattered realities: A fractured hand gesture on dark canvas expressing vulnerability
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Secure data storage concept with blocks and padlock illustration.
Grunge style rectangular rubber stamp displaying text IT SECURITY RISK, indicating potential digital vulnerability or cyber threat assessment
Emblematic Crisis Logos. Facing a personal crisis with vulnerabi
Protecting vulnerability hands shielding a child near a toilet bowl
3D Risk Infrastructure Icons. Infrastructure Risk Management flat isometric set: hazard-assess node, vulnerability-metric tile, resilience-plan bead.
Four open padlocks showing different styles of broken security
Stick Figures on Bench Showing Vulnerability and Innocence, stick figures, bench illustration, emotional expression, vulnerability art, open body language, child-like innocence, Sarah and Marcus,
Broken shield icons symbolizing security breach, failure, damage, and vulnerability protection
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Cybersecurity icons portraying digital protection for networks, data, and personal information, ensuring online safety in the digital age with shield and lock symbols
Cyber attacks blue word concept. Phishing attack. Data protection. Software vulnerability. Horizontal vector image. Headline text surrounded by editable outline icons. Hubot Sans font used
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Vulnerability Icon
Risk Management Icon Set Multiple Style Collection
Next page
/ 10