Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Sad depressed woman in despair and grief mood, sitting curled up, hugging knees. Frustrated desperate upset female, overwhelmed by sorrow. Flat vector illustration isolated on white background
Visual representation of software vulnerability detection icon illustration
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Supply Chain Risk Icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
 Essential Vulnerability Icon for Cybersecurity
Risk Icon
Security Breach
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Security warning shield indicating a potential threat or vulnerability
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Cyber Risks Icon Style
Broken shield icon Simple thin outline
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Social Inequality Line Banner Web Icon Set Vector Illustration, Inequity Exclusion Wealth Prejudice Social Class Hierarchy Fragmentation Education Level
Risk Flat Icon
Network Defense Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Vulnerability  Icon Set Multiple Style Collection
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
virus in mail icon sign vector
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
Cyber Threat Icon
Failure Mode Blue Icon
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple glyph vector
Risk Icon
Security Breach
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
A flat design depicts various cybersecurity elements illustrating potential ransomware threats and defenses, Ransomware Customizable Flat Illustration
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Security Risks Icon Style
Penetration Testing Icon
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Risk Factors Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
 Icon of Vulnerability for Security Management
data and document protection
Cloud with Risk and Up Arrow
Disempowerment Blue White Icon
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Failure Mode Outline Icon
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
Penetration Testing Icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Detection Icon
Exploit Icon
Unsecure Vector Design Icon Style
Security Patch icon
Exploit Icon
 Icon of Security Patch for Vulnerability Management
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
silhouette of a girl and  domestic violence
Penetration Testing Icon
The program offers a safe space for individuals to share their vulnerabilities and receive understanding and validation from their peers.. Vector illustration
Ethical hacking involves protection, security, and trust. Key objects, shield, lock, handshake. Outline icons set.
Risk Icon
Weakness Outline Icon
warning on browser icon sign vector
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Penetration Testing Icon
Cybersecurity consulting service gradient header information consultant professional solution for company information technology cyber security
Encircling Care: A Single-Line Embrace of Vulnerability
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
IT risk glyph icon
computer protection icon sign vector
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
Insecure Icon
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
 Vulnerability Icon for Risk Assessment
A hand delicately pierces a balloon labeled ego, symbolizing the fragility of self-importance in a serene and minimalistic setting that evokes thought and reflection
Honeypot Icon
Penetration Testing Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Failure Mode Flat Icon
security assurance icon sign vector
Threat Flat Icon
Penetration Testing Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Security shield icon.  A graphic representation of protection and safety, symbolizing data security, privacy, and secure access. Ideal for websites, apps, and presentations.
Open Source Icon
security antivirus check mark icon sign vector
Risk Icon
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Exploit Icon
Next page
/ 10