Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Risk management and financial business danger evaluation tiny person concept, transparent background.
Security Icon
Flat minimal icons for data breach, cyber threats, hacking, system risk, password leaks, unauthorized access, virus, phishing, database security, and encryption.
Set of four cracked shield pictograms in a line, representing broken security, vulnerability, or failed protection. These vector illustrations are perfect for interface elements, social media posts
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Simple set of vulnerability related filled icons.
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Monitor with digital alerts, security icons, pie chart, and boxes illustrating cybersecurity, online privacy, risk assessment, data analysis, logistics, e-commerce and vulnerability as simple flat
vulnerability cyber security system illustration lock symbol circuit broken
Security Breach White Icon Set Design
Zero Day Icon
Risk Assessment Icon
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Security Audit Icon
Technology Lock Security,protection and Safe Concept,on Global background Hi-tech and technology concept design.
software testing concept. flaw analysis in a program or system. technology weaknesses. illustration of a bug hunter looking for vulnerabilities and bugs in a program script. flat style design. element
Cybersecurity Icon Set collection with antivirus, password and internet icon
Hacker activity icon set collection. Simple line vector.
Cartoon tree bending under strong winds, illustrating nature's power and climate change vulnerability
Broken chain link connection failure concept metaphor for disconnect and vulnerability symbol for weakness
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
Website bug detection software security vulnerability testing and malware analysis tool
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Set of ten minimalistic thin line icons representing cracked shields, symbolizing broken security, vulnerability, or failed protection. These vector graphics are ideal for web design, app interfaces
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Certified Ethical Hacker - CEH - icon set & web header banner
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Cybersecurity shield, digital protection, circuit board, data security concept.
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Grunge style rectangular rubber stamp displaying text IT SECURITY RISK, indicating potential digital vulnerability or cyber threat assessment
Security scan icons set in black filled and stroke line style
Cybersecurity Icons Data Protection, Privacy, and Network Security
Cyber crime icon set bundle. Multi style icon collection perfect for websites, apps, and presentations. Simple vector icon collection
Antivirus software searching for viruses, malwares and vulnerabilities.
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Abstract technology security on global network background, vector illustration
Set of 15 minimalistic thin line icons representing cracked shields, symbolizing broken security, vulnerability, or failed protection. Ideal for web design, app interfaces, banners, social networks
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Solid black icon for Vulnerability
Set of mitigation Icons or symbols Vector fully editable file.
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Scanner vulnerability detection vector analysis cybersecurity icons icon behavioral sandbox analytics grid
Hacker icon cyber spy, hacker icon, hacker icon set.
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
vulnerability line icon
Penetration Testing Icon
Broken shield icon vector outline set illustration sign
Bug Icon
Cybersecurity Icon Set. Cybersecurity Shield Set linear set: firewall barrier, encrypted lock, secure cloud, threat radar, data vault, vulnerability scan, intrusion alarm, malware
Risk  Outline Icon
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Distressed and fractured circle design representing vulnerability and fragility symbol
Risk Management Risk Management Bundle H50
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Cybersecurity Risk Icon
Patch software. Operating system updates that address security vulnerabilities
Exploit Icon
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Weaknesses Icon
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Clickjacking White Icon Set Design
Risk Management Icon
Ethical Hacking Icons. Ethical Hacking silhouette icon set: laptop with code, shield icon, hacker silhouette, vulnerability report, checklist document, firewall grid, magnifying
Various cyber attack outline icons, including security symbols and hacker illustrations.
Bug Bounty Icon with Beetle Design on Transparent Background
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
AI in Cybersecurity abstract concept vector illustrations.
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Vulnerability Icon
Exploit software tool. Software bug or vulnerability break out. Cyber
Flat illustration of woman managing IoT security internet of things protection
Cyber security icon set. Digital protection measures, computer virus, malware threat, data privacy, phishing email, password access. Vector flat cartoon illustration symbols.
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Cybersecurity vulnerability black glyph icon. System weakness and flaw. Cybercriminal gains access. Errors exploitation. Silhouette symbol on white space. Vector isolated illustration
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Debug icon symbol collection on white background.
Zero Day Multistyle Icon Set
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
hacker scammer computer technology. cyber security concept. attack and data digital. dangers of internet theft
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Cybersecurity concept with a hooded hacker typing on a keyboard, surrounded by glowing digital screens displaying code and a prominent padlock icon, symbolizing internet crime and data protection in
breach cyber security system concept illustration
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Next page
/ 10