Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Cyber threat Icon
Negletful Parenting Style. Flat Vector Illustration
Threat Icon
Threat Intelligence Icon Lineal Blue Style
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
A comprehensive set of icons illustrating various aspects of cyber attacks, including threats, defenses, and security measures.
Security warning shield indicating a potential threat or vulnerability
Vulnerability Assessment Icon
Cybersecurity Vector Icon Set | data protection, malware, phishing, email threat, firewall, secure server, hacking alert, cloud security, virus warning, encryption, software bug, password lock
Security Patch Vector Icon. Shield with an adhesive bandage, fixing software vulnerabilities, isolated sketch for cybersecurity, updates, system maintenance
phone virus hack icon sign vector
Code Legacy  Icon Set Multiple Style Collection
Honeypot Icon
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
Penetration Testing Icon
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
network warning glyph icon
Website bug detection software security vulnerability testing and malware analysis tool
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Risk Icon
Cybersecurity Risk Icon
Threat Icon
Sad depressed woman in despair and grief mood, sitting curled up, hugging knees. Frustrated desperate upset female, overwhelmed by sorrow. Flat vector illustration isolated on white background
Ethical Hacking Icon
Risk Factors Icon
Cyber Risks Icon Style
Broken shield icon Simple thin outline
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Risk Flat Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Risk Management Framework icon set in Mixed style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Ethical hacking involves protection, security, and trust. Key objects, shield, lock, handshake. Outline icons set.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Security Breach
Illustration of a man using a laptop with an unlocked password, signifying data security issues Consider using it for cybersecurity or data protection concepts.
Flat illustration One man coughed and sneezed continuously because the dust and smoke were damaging his lungs.
Cyber scanner Icon
Cybersecurity Risk Icon
Threat Icon
AI cybersecurity risks and machine learning vulnerabilities in digital security. AI security threats, data breaches, hacking risks and advanced protection strategies. Cybersecurity vector illustration
The program offers a safe space for individuals to share their vulnerabilities and receive understanding and validation from their peers.. Vector illustration
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Failure Mode Outline Icon
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
shield X glyph icon
user protection icon sign vector
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Security scan Icon
Security Breach
Security Risks Icon Style
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Penetration Testing Icon
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Threat Icon
Risk Icon
security assurance icon sign vector
Exploit Icon
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple flat vector illustration.
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
password fraud icon sign vector
cyber security icon sign vector
vulnerability line icon
Hacker activity icon set collection. Simple line vector.
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Cyber Security Icon
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Risk Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
 risk
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
Penetration Testing Icon
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Threat Icon
Security Patch icon
Risk  Outline Icon
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Weakness Outline Icon
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
Insider Threat Icon
computer protection icon sign vector
Exploit Icon
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
Insecure Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Exploit Icon
Vulnerability Icon
Misconfiguration Icon Lineal Syle
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Next page
/ 10