Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Vulnerability Icon
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
Cyber Risks Icon Style
A shadowy figure, digitally manipulated, symbolizes the hidden perpetrator of cyberbullying, highlighted by a single spotlight.  Illustrate the vulnerability of the victim.
Mutual Support Giving up seat in public transport -modern flat vector concept illustration of man offering his seat to elderly woman on bus A metaphor of voluntary, collaborative exchanges of services
Vulnerability Assessment icon
image of a sad girl
blonde woman delicately covers her eyes conveying a sense of vulnerability against a muted cityscape backdrop.
Eavesdropping Icon
A senior citizen receives a COVID-19 vaccination, highlighting healthcare workers' dedication and the elderly's vulnerability to the virus.
Pleading Face Emoji
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Online Robbery Icon
Abstract technology security global network background, vector
Software bug or coding errors, system malfunction or software crash, performance issues or application slowdown, data corruption or file errors, security vulnerability or exploit, coding mistake or lo
Hybrid Intrusion monitoring and detection concept, Real-time adaptive security vector design, Web hosting service Symbol, Computing machines Sign, Internet Application Management stock illustration
vulnerability
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Vulnerability Outline Color Icon
1045 - Data Leak Concept Illustration
Exploit Icon
Maintenance smartphone technology search system
Security Risks Icon Style
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Detection vulnerability illustration of system bugs and network threats
Emotional Vulnerability Vector Icon
A woman trapped within a complex, chaotic web of tangled threads symbolizing deceit and lies.  Her expression conveys vulnerability and despair.
Antivirus line editable set. Containing malware, security, trojan, spyware, firewall, scan, protection, and more icons. Vector illustration
Eavesdropping Icon
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Security Testing Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Vector hand drawn cartoon illustration of a green dragon monster mascot character, sword and fly swatter in hand, protecting computer from bug virus malware attack
Sad woman with tears streaming down her face in flat vector illustration style conveying deep emotion and vulnerability in a minimalist design vector art
Cloud computing security breach for internet of things
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Security Outline Color Icon
Two women expressing emotions in a minimal style, one thoughtful and one distressed, conveying a sense of vulnerability in vector illustration
Zero Day Icon
email with virus, phishing vector icon
Risk Vector Design Icon Style
Cyber security technology on circuit board. Abstract background futuristic Hi tech style, Technology data protection system, Internet security and safety information personal, Vector and Illustration.
Stylized depiction of flood, emphasizing climate change vulnerability icon
Disempowerment Glyph Blue Grey Icon
Sql Injection
Shield on a futuristic digital background. Concept of cybersecurity, antivirus protection and secure data transfer in a high-tech environment. Protection of information and Internet projects.
Data Breach Icon
Flat illustration of woman developing secure software with security shield and programming code
Adult Aggression and Child Vulnerability
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Penetration Testing Icon
A minimalist sketch of a figure sitting in a posture of sadness and isolation.
Bug bounty icon featuring a document and a bug symbol representing software vulnerabilities
Single transparent shrimp against deep blue ocean, minimalist composition.
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
51 Attack Outline Icon
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Exploit Icon
Firewall Breach Vector Illustration Concept of Network Security Attack
QR code and tag on a smartphone beside a geometric Trojan horse and metadata tag. Ideal for cybersecurity, data encryption, digital banking, vulnerability awareness, digital threats, online payments
Server security refers to the protection of servers and the data they host from unauthorized access, cyberattacks, and other vulnerabilities. Key practices include firewall configuration, intrusion de
Businessman using hypnosis with pendulum to influence employee. Vector concept of corporate manipulation, mind control, persuasion, suggestion, trance, compliance, and workplace power dynamics.
Vulnerability Assessment Icon
Expressive hand-drawn vector illustrations featuring silhouettes of figures in various poses of contemplation and vulnerability
Cybersecurity Process: A visual representation of a circular process highlighting key elements of cybersecurity, including enhanced privacy, user control, secure management, and reduced risk.
Escalation Icon
Botnet Icon
Patching Icon
Hardening Icon
Hardening Icon
Patch Icon
The Information Security flat icon set highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
50 cybersecurity icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Vulnerability Icon
Honeypot Icon
Exploit Icon
Vulnerability Icon
Exploit Icon
Exploit Icon
Vulnerability Icon
Exploit Icon
Zero Day Icon
Zero Day Icon
Vulnerability Icon
Exploit Flat Icon
Exploit Blue Icon
Failure Mode Blue Icon
The Impact of Cyberbullying
Zero Day Outline Icon
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple flat vector illustration.
Parental Conflict and Child Impact
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Risk Assessment icon set multiple style collection
Childhood Fears and Nightmares
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Zero Day Icon
Next page
/ 10