Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Risk Management Icon
Online Robbery Icon
image of a sad girl
A darkhaired man embracing a blonde tearful child suggesting comfort or consolation
A minimalist sketch of a figure sitting in a posture of sadness and isolation.
Risk Icon
1045 - Data Leak Concept Illustration
Parental Conflict and Child Impact
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Decryption Icon
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Firewall Breach Vector Illustration Concept of Network Security Attack
Vector outline broken padlock icon representing security risks and vulnerabilities
Female psychologist and male patient talking in therapy session. Psychology, mental health support, counseling, emotional wellness concept. Flat vector illustration isolated on white background
Compromised shield icon, security failure or data breach symbol. Broken protection and system vulnerability graphic, unsuccessful defense or attack illustration.
Distressed figure in monochrome with flowing paint, conveying vulnerability
mortality death life aging icons set vector
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Earth in Distress cry
Cybersecurity Process: A visual representation of a circular process highlighting key elements of cybersecurity, including enhanced privacy, user control, secure management, and reduced risk.
Security analysis or risk assessment, vulnerability assessment or threat detection, security audit or compliance check, data protection or encryption evaluation, network security or perimeter defense,
Supply Chain Risk Icon
Unsafe Icon
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Shattered self-image. Broken mirror reflecting a fractured male face. Concept of identity crisis, mental turmoil, psychological distress, inner conflict, and despair. Hand holding mirror illustration.
Network Defense Icon
Cybersecurity network protection concept. Businessman at laptop protected by digital shield from hacker, malware, virus, and phishing attacks. Data security and privacy illustration.
Childhood Fears and Nightmares
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Threat Icon
Cybersecurity breach concept. Hacker stealing confidential documents and data from a laptop. Cybercrime vector illustration with a broken lock, warning sign, and internet thief. Security risk.
Minimalist Line Art of a Precarious House on Shifting Sands in 2
Vector outline unlocked padlock icon representing security vulnerabilities
Shield Slash Solid Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
Hacker in hoodie illustration. Cybersecurity concept of cyber crime, internet fraud, and data breach. Man at laptop stealing password. Phishing, malware, virus attack vector.
Woman with tear rolling down cheek showing silent emotion and mental health pain
Hacker at computer, cybersecurity threat concept. Vector illustration of data breach, phishing, internet crime, and malware. Digital security, privacy protection, and network safety.
Online scam alert. Distressed man victim of cybersecurity threat, hacker on smartphone. Phishing, malware bug, data theft. Internet fraud, digital vulnerability, online safety, tech support concept.
51 Attack Blue Icon
Safe mode technology icon in the technological comb bacground
Cyber security concept of a phishing attack. Hacker stealing sensitive data and passwords from a computer. Data breach, internet fraud, identity theft, malware, and privacy risk vector.
Data Leak Icon
Camping Journey. A Bundle of Resilience and Hope Collection Illustrations
People Securing Online Data Shields, Locks, and Key on Digital Screen Illustration
Conceptual Vector Illustration of a Person Trapped by Harsh Criticism and Negative Feedback, Symbolizing Emotional Struggle and Mental Pressure in Modern Life
Bullying and Distress
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Exploit Icon
Threat icon
Bug on computer screen, software vulnerability graphic illustration
Certified Ethical Hacking icon showing security and hacking idea
Collection of Red and Black Cybersecurity Icons
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Cyber Scam Illustration: Phishing attack via smartphone message. Hook baits user with fake notification for data theft, online fraud, and hacking. Cybersecurity awareness concept.
analysis scanning server vector
Hacker in hoodie at laptop computer. Cybersecurity concept with digital padlock icon. Cybercrime, phishing, and data breach. Network security threat and internet privacy vector.
Cyber attack and data breach concept. Hacker stealing confidential information from laptop. Cybersecurity threat, phishing, identity theft, privacy violation and online fraud.
Cybersecurity threat vector illustration showing a red malware bug and warning sign on a laptop with code, symbolizing system vulnerability, software errors, and network risks.
51 Attack Glyph Icon
Security Vulnerability Scanner Icon
Threat Detection icon sheet multi style collection
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
Camping Journey. A Bundle of Resilience and Hope Collection Icons
Zero Day Icon
Cybersecurity protection icon set for digital safety websites, IT service providers and data protection educational materials
ear and Nightmares
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Patching Icon
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Computer chip with insect represents cyber security vulnerability concept
Collection of Secure Data Protection and Cyber Security Line Icons
Safety Internet Day. Flat Vector Illustration
Online Robbery Icon
Risk management and financial business danger evaluation tiny person concept, transparent background.
Hazard Icon Outline Style. Vector Illustration For Graphic Design
Detection vulnerability illustration of system bugs and network threats
Cybersecurity concept for cloud computing security. Data protection and information privacy vector banner. Network firewall, antivirus, encryption, and malware detection illustration.
Cyber threat alert vector illustration showing a computer screen infected with malware, surrounded by network connections, a skull icon representing danger, and a padlock symbolizing security breach.
Failure Mode Blue Icon
Cybersecurity Threats Icon
Threat Icon
Penetration Testing Icon
Camping Journey. A Bundle of Resilience and Hope Collection Stickers
Disempowerment Blue White Icon
Intrusion Glyph Icon
Depressed Woman with Trauma from Bullying
Hardening Icon
Eavesdropping Icon
Vulnerability Icon
Honeypot Icon
Exploit Icon
Vulnerability Icon
Exploit Icon
Online Manipulation and Social Engineering
Hacker stealing confidential data. Cybercrime concept with data breach, identity theft, and phishing attack. Cybersecurity threat, personal information leak, internet fraud vector.
Zero Day Outline Icon
Threat Intelligence Icon Lineal Blue Style
Malware Bug Icon for Cybersecurity Data Privacy Encryption and Protection
Next page
/ 10