Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Digital Cloud Security Shield Protecting Data and Information.
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
傷ついた盾のシンプルなイラスト
Shield security protected icon, unprotected vulnerability cross red safety guard sign symbol drawn doodle cartoon illustration set, rejected red and approved green safeguard guarantee clip art logo
a silhouette of a person in a gas mask disintegrating into fragmented particles illustrating environmental crisis and human vulnerability
Exploit Icon
Cybersecurity defense icons including red team simulator automated penetration testing broken chain link security penetration simulator protection vulnerability cybersecurity mitigation
This illustration conveys the vulnerability of individuals to viruses and disease. It's ideal for health-related content, awareness campaigns, or arti
Cybersecurity icons for vulnerability prioritization attack surface mapping exploit mitigation with protection strategy cyber threat risk management security assessment data security network secu
Against a cityscape silhouette, a damaged power line is spotlighted, contrasting a flashlight with a candle, creating a symbolic illustration of energy infrastructure vulnerability
Man on the edge of a cliff, contemplating a leap into the unknown, illustrating a moment of decision and vulnerability
Entangled heart a sketch of love and pain representing complex emotions and vulnerability in a raw form
Digital security concepts including password protection, phishing awareness, multi-factor authentication, data encryption, vulnerability scanning, physical security, insider
Cyber Crime and Digital Security Minimalist Monoline Geometric Line Art for Network Protection and Data Privacy Interface Design.
Cybersecurity icons collection featuring penetration testing, risk analysis, security audit, social engineering, phishing simulation, code review, vulnerability scan, network
Silhouette child with radiating energy and protective shield with handprints conveys concepts of vulnerability and safety.
Illustration of a single clear and pristine teardrop, conveying purity and symbolizing freshness or emotional vulnerability against a white backdrop
Root Cause Icon Element For Design
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Vulnerability Icons
A person falling backwards in a dynamic pose depicted as a silhouette
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Cybersecurity vulnerability scan vector finding weak point in system
Hardening Icon
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
This illustration conveys the vulnerability of human health to viral threats. Ideal for health awareness campaigns, medical content, or educational ma
Breach icon sheet multiple style collection
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Bug fixing doodle for improve website performance
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Computer programming icon set with building, hardware, computing, cpu, usability, efficiency, analysis, designing, function, software, development, prototyping, decomposition, source code, engineering
Abstract technology security global network background, vector
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
A patient's bare feet walk cautiously down a sterile hospital corridor, symbolizing recovery, vulnerability, and the journey through medical care.
Cyber crime and hacker attack concept demonstrating hackers stealing sensitive data using technology in a digital environment
Security Breach Icon
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Disruption Multistyle Icon Set
The image shows multiple irregular fragments of shattered glass scattered on a white background. The fragments vary in size and shape, with some showing sharp edges and others appearing
Cybersecurity set. Protecting data from threats. Users confronting various malware types: virus, ransomware, spyware. Adware dangers, botnet traps, worm intrusions. Flat vector illustration
Breach Icon
Risk Assessment Icon Element For Design
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Security Audit multistyle icon
Hacker activity icon set collection. Simple line color vector.
Failure Mode Outline Icon
Broken shield icon representing vulnerability security risk and system failure showing a lack of protection against digital cyber attack
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Abstract technology security on global network background, vector illustration
Security threats icon with shield and lightning bolt symbolizing cyber risk, protection issues, system vulnerability and danger vector illustration
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Digital lock protect data flow in global network
Market Data Icon  in black line style icon, style isolated on white background
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Virus detection icon set with scan,quarantine,sandbox and system update concepts.Ideal for antivirus software,malware analysis and cybersecurity monitoring systems.
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Mitigation icon set. Icons related to preparedness, disaster, risk, reduction, strategy, resilience, vulnerability. Outline icon set. Vector illustration with editable stroke
Exploit Multistyle Icon Set
Network Defense workflow for securing infrastructure from cyber threats and attacks with layered protection strategies
Digital security padlock icon with network connections on a dark blue background
Secure Coding Icon
Illustration depicting various aspects of cybersecurity and data protection Vector
Flooded valley infrastructure damage illustration with a minimal bridge partially submerged and water flowing beneath, expressing vulnerability of transport
Broken Shield Symbol Vector Defense Failure Logo Templates
An Old Virus Infecting Computer Ports
Cloud security vector line icons set. Cloud, security, infrastructure, data, authentication, compliance, encryption illustration outline concept symbols and signs
Crime scene on a laptop
Various icons representing different human emotions and mental states depicted in a simple, monochromatic style for educational purposes
Security icon set, shield, lock, firewall, fingerprint, warning, password, protection signs
Continuous Line Drawing of a Shield with Sound Waves. Continuous line style. Hand drawn. Line art. Vector design. illustration
Contrast between secure and vulnerable neural network systems
Vector Icon of Bug Shield for Cybersecurity and Virus Protection Illustration
Vulnerability Embrace Icon
Data exfiltration alert and cybersecurity threat detection concept illustration. EPS Editable. Vector Illustrations.
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Shopping basket next to warning triangle and bug icon highlights cybersecurity risks in online shopping. Ideal for e-commerce security, warning, technology, software vulnerabilities, online safety
Broken black shield icon representing shattered protection and vulnerability
Secure Cloud Data Storage - Mobile Phone Shielded by Protection.
Illustration of cybersecurity concepts including hackers, firewalls, and secure databases. Vector
Security Testing Icon
Concept of domestic violence - silhouette of a woman's head and other hands gesture. Vector illustration on a white background.
Virus detection icon set with scan,quarantine,sandbox and system update concepts.Ideal for antivirus software,malware analysis and cybersecurity monitoring systems.
Vulnerability icon set featuring zero day,exploit and data breach.Ideal for cybersecurity analysis and threat detection concepts.
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Cyber Defense web banner icon vector illustration with icons of Cyber Security,Cyber Attack,Cyber Defense,Hacker,Cybercrime,Vulnerability and Exploit
Cyber Defense web banner icon vector illustration with icons of Cyber Security,Cyber Attack,Cyber Defense,Hacker,Cybercrime,Vulnerability and Exploit
Virus detection icon set with scan,quarantine,sandbox and system update concepts.Ideal for antivirus software,malware analysis and cybersecurity monitoring systems.
Cyber Defense web banner icon vector illustration with icons of Cyber Security,Cyber Attack,Cyber Defense,Hacker,Cybercrime,Vulnerability and Exploit
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Virus detection icon set with scan,quarantine,sandbox and system update concepts.Ideal for antivirus software,malware analysis and cybersecurity monitoring systems.
Vulnerability icon set featuring zero day,exploit and data breach.Ideal for cybersecurity analysis and threat detection concepts.
Virus detection icon set with scan,quarantine,sandbox and system update concepts.Ideal for antivirus software,malware analysis and cybersecurity monitoring systems.
Next page
/ 10