Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Risk management and financial business danger evaluation tiny person concept, transparent background.
Computer Problem User Composition
Vulnerability Multiple Style Icon Set Vector
Cybersecurity vector icon set. Digital protection, security and vulnerability concepts. Includes shield, virus, malware, bug, network attack, phone warning, and hack symbols.
Cybersecurity and Data Protection Icon Set – Editable Vector Illustrations for Network Security, Firewall, Ethical Hacking, Privacy, Virus Protection, and Cybercrime Prevention
Threat Assessment Icon
Supply Chain Risk Icon
System administrator online service or platform. Technical work with server
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
A digital illustration depicting a stylized cityscape partially submerged in water. The buildings are rendered in shades of blue and gray, with varying heights and shapes, suggesting a modern or
Zero Day Icon
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Software quality assurance, cybersecurity firewall, system, software icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
A security shield with an exclamation point, symbolizing vulnerability.
Network Security Icon
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Protection background. Technology security, encode and decrypt, techno scheme
Risk management mind map flowchart business concept for presentations and reports
A sleek black and white vector icon depicting a wine glass with a visible crack  symbolizing breakage or damage. Perfect for designs related to fragility  accidents  loss  or vulnerability
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Risk
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Abstract technology security  global network background, vector
30 Social Inequality Line Icons Vector - Discrimination, Prejudice, Racialism, Education level, Wealth, Social class
Print
Hacker activity icon set collection. Simple line vector.
Computer Programing icon collection set. Containing performing, cpu, computing, integration, testing, analysis, generating, algorithms, hardware and debugging icon. Simple flat vector.
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Cybersecurity intelligence line icons collection. Threats, Breaches, Hacks, Malware, Vulnerabilities, Pentesting, Encryption vector and linear illustration. Firewalls,Intrusion,Phishing outline signs
Vulnerability Outline Icon
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
A diverse group of people running for their lives to escape a catastrophic tsunami wave, an illustration of survival and emergency evacuation.
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Business IT Security Concept Design, Mesh of Connected Network Client Nodes
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Secure Coding Icon
Protección de las personas mayores o tercera edad.
Protection background. Technology security, encode and decrypt, techno scheme
Understanding Cybersecurity Principles and Practices for Digital Protection and Risk Management
Finger pointing at cyber security lock
Threat Mitigation Icon
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Security Testing Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Vulnerability search. SEO optimization,web analytics, programmin
Social volunteering or social care concept. With three illustrations of social workers helping elderly and disabled people. Flat vector illustration
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Security scan icons set in black filled and stroke line style
Incident Multistyle Icon Set
Digital illustration depicting a polar bear standing on a fragment of melting ice.  The ice is cracked and shows water underneath. In the background, an offshore oil rig is visible. The style is
Penetration Testing Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Illustration of a broken chain link symbolizing weakness or vulnerability.
Root Cause Icon Element For Design
Exploit Icon
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
Security Icon
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Penetration Testing Icon
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Failure Mode Outline Icon
Vulnerability text with decimal number background
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Bug fixing doodle for improve website performance
Vulnerability Icons
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Sign of Meltdown and spectre vulnerability on notebook monitor
Exploit Multistyle Icon Set
Simple set of vulnerability related filled icons.
Risk Assessment Icon
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Kneeling Man, SingleLine Drawing, Sorrow, Despair, Grief, Pain, Suffering, Depression, Anguish, Huma
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Hardening Icon
Recognizing elder abuse, physical, psychological, economic, and environmental signs
computer virus icon sign vector
Cybersecurity threat detection vulnerability attack defense security eye bomb warning data analysis vector art illustration and png
Risk Assessment Icon Element For Design
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Broken shield icon vector outline set illustration sign
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Flat illustration of man performing penetration testing ethical hacking and improving security
ID badge next to a bug under a cloud represents digital identity, cybersecurity threats, and data protection issues. Ideal for IT, tech safety, risk management, digital ID, software vulnerabilities
Cyber scanner Icon
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Hardening Icon
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Decryption Icon
Next page
/ 10