Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Threat detection vulnerability scan security risk assessment icon vector eps silhouette
Cybersecurity line icon set. vector pictograms of protection, shield, virus, phishing, and vulnerability, thin outline illustration.
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Virus Icon Set Multiple Style Collection
Cyber security icon set. Digital protection measures, computer virus, malware threat, data privacy, phishing email, password access. Vector flat cartoon illustration symbols.
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Leadership Vulnerability Icons. Leadership vulnerability. Line icon set of leadership vulnerability: heart, shield, open hand, human head, speech bubble,
Flashing Red Emergency Siren with Yellow Light Rays.
Threat Detection icon sheet multi style collection
Risk icon sheet multiple style collection
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
Risk Icon Line and Black Fill Style Collection
Malware infection on document causing software security vulnerability concerns
Three hooded hackers working together on laptops in the dark
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Social vulnerability icon set, diverse population symbols, support group graphics, healthcare and policy visuals, inclusion and equity design elements
Digital Scam Warning on Mobile Phone Screen Vector - Cyber Security Alert Interface with Red Neon Glow Technology
Broken shields show vulnerability and represent failure,Broken shield icons in bold and outlined styles.Broken Shield icon - vector. Security Shield icon in flat style. Symbols of broken protection.
Businessman shielding from rain near falling dominoes representing risk and protection
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Hand-drawn black and white sandcastle is about to be destroyed by a giant crashing ocean wave in a dramatic sketch style illustration showing impermanence and vulnerability
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
vector banner of cyber resilience framework in creative flat design suitable for web banners business presentations online articles cybersecurity awareness materials digital transformation visuals
Shattered realities: A fractured hand gesture on dark canvas expressing vulnerability
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Cybersecurity concept with a hooded hacker typing on a keyboard, surrounded by glowing digital screens displaying code and a prominent padlock icon, symbolizing internet crime and data protection in
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Abstract illustration of three hooded figures in dark blue tones
Website security vulnerability illustration showing software bug detection
Illustration portraying expressive eyes with tears conveying deep sadness and vulnerability
Cyber security and network defense line icon set. Vector pictograms of firewall, encryption, phishing, and vulnerability analysis, thin linear illustration.
Illustration of a person in a hoodie and mask typing on a keyboard in front of computer screens
Vulnerability. Outlined stroke vector icon with black-filled details.
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Cybersecurity shield with lock and circuitry
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Abstract cyber security hackers with laptops and data flowing
Broken chain link vector illustration set representing disconnection and vulnerability
Cyber Risk Exposure Icon Set containing cyber hygiene, data sensitivity, threat landscape, regulation, vulnerabilities and third-party risk vector icons
Cybersecurity control room with analysts monitoring data on computers and security themed wall art
Cybersecurity threat icon set depicting a computer bug with an integrated circuit, representing malware, virus, software error, or system vulnerability
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Cybersecurity shield, digital protection, circuit board, data security concept.
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Network Security Icons. Outline style icon of Network Security Assessment Suite: vulnerability scanner, port scan radar, CVE
Risk Assessment Icon
Secure data storage concept with blocks and padlock illustration.
Cracked shield symbolizing security threats and cyber vulnerabilities
Risk Icon
Large set of outline vector icons for cyber security, data protection, digital safety, insurance, and system vulnerability symbols.
Broken shield icon vector outline set illustration sign
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Threat vector icon
Abstract Hacker Hooded Mask logo
Cybersecurity line icon set. Vector pictograms of mobile protection, user access, server, hacker, malware, data storage, and biometrics, thin linear illustration.
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
“The forest listens to their breath.”
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Broken chain link illustration symbolizing weakness vulnerability or disconnection with clouds
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Global supply chain disruptions impacting business operations and financial stability worldwide
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Security assessment icon set multiple style collection
Safeguard your data with robust cybersecurity solutions, ensuring comprehensive protection against online threats and vulnerabilities in a digital age of evolving risks
Risk Assessment Icons. Line style icons of risk assessment tools: risk matrix chart, likelihood vs impact icon, vulnerability
Isometric cybersecurity icons with warning symbols in vector art
Woman hugging a child, dark background, showing care and protection in simple art
Risk Icon
Cybersecurity threat modeling process flowchart diagram with risk assessment and attack vectors
Protecting vulnerability hands shielding a child near a toilet bowl
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Cookie Theft White Icon Set Design
Threat vector icon
Risk Icon
Symbolic illustration of a fractured shield with a silhouette of a person behind it representing vulnerability and broken protection against adversity
Collection of security icons, representing safety measures, access control, and protection against threats and vulnerabilities
Romantic Embrace - A Couple Surrounded by Hearts Expressing Love.
broken padlock symbolizing a data breach, vector illustration for cybersecurity threat, information leak, and digital vulnerability
Emotional Icon Array. Emotional Expression Collection linear icon set: joy burst, sorrow drop, compassion flame, gratitude beam, vulnerability symbol, calm breeze, open gesture
Next page
/ 10