Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Exploit Icon
Risk management line outline icon
Emotional struggle of a young person expressing vulnerability in artistic form
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
vector icon of a document with a shield with a blue background in the shape of a shield
Security Testing vector icon illustration of Quality Assurance iconset.
Site threat Icon
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Hacker in a mask
Shipwreck sinking in the ocean, illustrating concepts of maritime disaster, insurance, and vulnerability at sea
Upset woman holding back tears illustrating emotional struggle and vulnerability
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Risk Flat Icon
malware, cyber attack line vector icon
Cyber Security Incident Outline Color Icon
Escalation Icon
Privilege Escalation Icon Lineal Blue Style
A computer protected by a shield on top, symbolizing online data security, Online data security restoration, Simple and minimalist flat Vector Illustration
Vulnerability Icon
Vulnerability Icon
Patch software web banner or landing page. Operating system updates
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Successful Businessman Battling Inner Psychological Struggles, Overcoming Self-Doubt for Personal Growth
Set line icons of risk management isolated on white
Security warning Icon
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
The program offers a safe space for individuals to share their vulnerabilities and receive understanding and validation from their peers.. Vector illustration
攻撃を受けてPCのセキュリティが破られるイメージ
Develop and implement proactive security plans to address vulnerabilities and enhance overall network protection
Emotional vector illustration of boy crying, emphasizing his emotional state and vulnerability
Risk management and financial business danger evaluation tiny person concept, transparent background.
Security vulnerability icon in line design. Security, vulnerability, cyber, hacking, malware, threat, antivirus, data breach on white background vector. Security vulnerability editable stroke icon
This illustration depicts a temple engulfed in flames, symbolizing destruction and loss. It serves as a poignant reminder of the vulnerability of cultural and religious sites to disasters
Vulnerability Outline Color Icon
Eavesdropping Icon
Privilege Escalation Icon Black Style
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
The Resilience of Imperfection: A Flawed Vessel Blossoming with Beauty
Vulnerability Icon
Risk Assessment Icon
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Hacker use KRACK method for steal important data with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Unhappy Woman Reporting Smartphone Hacker Attack and Malware
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Code issue Icon
Root Cause Icon Element For Design
Black line icon for Vulnerability
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Continuously analyze systems and networks to identify potential security vulnerabilities and threats
Market Data Icon  in black line style icon, style isolated on white background
Risk Icon Line Blue Style
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
Risk Assessment Outline Color Icon
Hardening Icon
Threat Intelligence Icon Black Style
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Laptop and cybercrime
Zero Day Icon
Risk Assessment Icon
Broken link RGB color icon. Hyperlink that no longer points to its original destination. Error in webpage working process. Isolated vector illustration
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline concept vector illustrations
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
Security scan Icon
Zero-Day Exploit icon line vector illustration
Solid black icon for Vulnerability
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Protection background. Technology security, encode and decrypt.
Maintenance smartphone technology search system
Risk Icon Lineal Style
Security Testing Icon
Bug Threat Icon - Bug Representing System Vulnerabilities
Trust Fall Glyph Icon
Botnet Icon
Iot Vulnerability Icon Black Style
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Cybersecurity Icons Data Protection, Privacy, and Online Security
Zero Day Icon
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Flat illustration of woman developing secure software with security shield and programming code
Security Icon
virus line icon
Black and white icon of a database server losing data protection from a cracked security shield
System administrator online service or platform. Technical work with server
Security scan flat line icon set. Security scan Thin line illustration vector
Panicked Users with Broken Padlock and Cracked Security System, Facing Hacked Accounts and Weak Passwords
Abstract symbols web banner templates set
Risk Icon
Protección de las personas mayores o tercera edad.
Cracked plate symbolizing fragility, broken dreams, and unexpected setbacks
malware flat gradient icon
Sicherheitslücke finden
Trust Fall Flat Icon
Patch Icon
Threat Intelligence Icon Lineal Blue Style
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Next page
/ 10