Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Vulnerability Icon
Three anime-style vector illustrations of a blindfolded woman in a black swimsuit and yellow raincoat, kneeling with head bowed, on a blue background, depicting vulnerability or contemplation.
Emotional risks romantic confession concept where a person nervously expresses feelings while tiny sparkle and star icons highlight vulnerability, courage, and
Inner emotional crack depicted by a seated figure with subtle fissures in the silhouette, tiny floating shards and stars suggesting vulnerability, reflection,
Isometric Illustration of Software Testing and Debugging Process.
Sharp thorns symbolize pain, struggle, and sacrifice against a clean background
Human silhouette with a shattered heart graphic illustrating emotional pain and vulnerability on a stark white background, symbolizing inner turmoil.
Cybersecurity, hacking threats, data breaches, cloud computing, online security, digital risks. Geometric Trojan horse with cloud and data arrows. Cybersecurity and hacking threats concept
Conceptual Illustration of Security and Protection Symbols for Privacy.
Set of four warning icons displaying different types of system errors
Cybersecurity crisis with businessman being monitored by invisible hacker through computer system vulnerability representing data breach risk and privacy violation in modern digital office environment
Man running with keyboard and shield representing cybersecurity.
Hacker with laptop in dark digital scene. Cybercrime, data breach, online attack, network threat, privacy risk, cybersecurity alert, future technology concept. Vector illustration
A broken piggy bank with coins spilling out on a white background
Woman sitting, head in hands, surrounded by barbed wire, seeking escape
Security check list and shield icon.
Phishing Icon Different Style Outline Collection Set Vector Illustration
Cyber Security Shield Logo with Digital Lock Icon.
Digital Shield with Padlock Symbol Representing Cybersecurity and Data Protection.
Cracked Shield Icons Set with Lightning for Security Breach, Damage, and Vulnerability Symbols
From vitality to vulnerability illustrating the profound difference between healthy and unhealthy lung conditions and their human impact
Crying alone in darkness with a single seated figure illuminated by a faint overhead light symbolizing isolation and emotional vulnerability. Subtle shadow
Emotional risks workplace scenario where a person hesitates to share ideas with colleagues while small sparkle and line icons emphasize courage, vulnerability,
Cyber Security Icons Set: Data Protection, Hacking, Network Threat, Malware, Lock, Search Stock Media
Isometric Data Security Cube with Padlock and Cloud Connection.
vulnerability icon
Cybersecurity Icon Set – Vector Collection for Data Protection, Threat Prevention & Risk Management
Cybersecurity, DDoS attacks, network vulnerability, internet threats, wireless communication, online safety. wireless symbol, person analyzing data rockets labeled DDoS. Cybersecurity and DDoS
Digital Shield Protecting Online Data and Information with Checkmark.
Contrasting depictions of a padlock symbolizing security and vulnerability
Illustration of Cybersecurity Professionals Working on Data Protection.
Cyber security hacking icon set featuring terminal window with skull symbol representing malware virus attack data breach and system vulnerability
Stylized computer bug icon representing a software vulnerability or cybersecurity threat
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Risk Icon
Supply chain problem, risk vulnerability industrial business, connection management chain together into concept, fatigue businessman manager holding metal to chain together
Isolation and Emotional Cornering Icon
Supply chain problem, risk vulnerability industrial business, connection management chain together into concept, fatigue businessman manager holding metal to chain together
Broken chain link representing weakness and vulnerability in a simple line art drawing
Threat Response strategy preventing phishing, analyzing risks, testing vulnerabilities, and protecting against malware attacks
Hacker, code, lock, warning, and network symbols highlight cybersecurity threats
Governance risk factors cosercily human everhoit bystanders and related issues
Brain Security and Data Protection Icons - Cybersecurity Concepts
A car's windshield is damaged by falling hailstones
A person embracing vulnerability, sharing their feelings with a friend. Icon set. Set Logo of A person embracing vulnerability, sharing their feelings with a
Cyber Crime Attack. Cyber Security Alert With Glowing Unlock Icon In Red Protective Sphere, Digital Cybersecurity Warning Banner For Online Safety, Futuristic Tech Threat Concept, Vector Illustration
Vulnerable Protect Concept: A stark visual representation of the contrasting concepts, where the vulnerability is juxtaposed with the necessity of protection, making a strong statement.
Poet on stage. A single speaker standing at a microphone, reading from a notebook under soft spotlight accents. The scene conveys focus, vulnerability, and
Cartoon stick figure looking scared and overwhelmed by many hands pointing fingers of blame and accusation from all directions.
Intricate Network of Digital Security and Data Protection Concepts.
Cyberattack on a fortified server room with shield and hackers
Software bug tracking and vulnerability scanning icons showing browser window with target crosshair and beetle insect for web security testing
Conceptual illustration of data security, protection, and privacy measures.
31 - 40
Technology, cybersecurity, AI development, data visualization, malware alert, robotics. Pie chart, bug warning triangle and robot figure with a backpack. Technology and cybersecurity concept
Cybersecurity concept depicting a lock shield and hooded hacker figure
Emotional risks interpersonal scene where a person hesitates to express feelings to a friend while small sparkle and line icons emphasize vulnerability,
Security Engineering icon set. Testing, Firewall, Monitoring, Disaster Recovery, Training, Data Protection, Analysis, Vulnerability. Duotone color solid and editable outline icons
Weaknesses icon set in line and glyph style on black and white background
Fragile soul visualized as a seated figure with subtle cracks along the body, tiny floating shards and decorative stars emphasizing vulnerability, reflection,
A black, broken padlock against a white background, symbolizing vulnerability or breach
Collection of illustrations showing a man's recovery process, self-care, and acceptance of body scars after surgery in different daily life scenarios.
Illustrative comparison of online security and data privacy for protected users versus tracking and vulnerability for digital information
A striking silhouette depicts the stages of human life from infancy to old age showing growth and progression
Advanced cybersecurity operations center dashboard interface with threat timeline, vulnerability scans and network defense analytics
A person embracing vulnerability, sharing their feelings with a friend. Icon set. Set Logo of A person embracing vulnerability, sharing their feelings with a
Conceptual Illustration of Digital Security and User Authentication Process.
securityrisk line icon
Cybersecurity shield icon with a keyhole and circuit board design
Continuous single line drawing depicting a chain with a broken link symbolizing weakness vulnerability and the breaking point ideal for corporate presentations on challenges
Cybersecurity shield protecting digital data servers from threats.
Laptop computer with bug virus warning sign on screen representing malware infection cyber security threat software error and system vulnerability
Conceptual illustration of data transfer and cloud computing technology.
Black silhouette of a child holding a broken heart on a white background with a somber mood.
Stylized depiction of people huddling in fear and distress beneath a looming tornado, symbolizing vulnerability and the overwhelming power of natural disasters
Minimalist vector icon of an closed padlock. Represents security access, vulnerability, data freedom, or privacy settings. Bold black and white circular silhouette for UI/UX design. (187 chars)
Emotional risks friendship conflict concept where a person hesitates to speak to a friend while tiny sparkle and star icons highlight vulnerability, honesty,
Collection of various broken black silhouette icons, including a heart, shield, chain, and skull, symbolizing fragility, damage, and failure in a clean graphic style
Collection of black human silhouettes in various crouching and sitting poses Keywords: silhouette, people, human, figure, man
Cybersecurity icons: cracked shield with bug for zero-day exploit and question mark in circle with padlock for unknown vulnerability with exploit icon with line art with data breach with danger sign
Cybersecurity data theft concept. Hacker stealing digital information from computer system minimal line art vector illustration emphasizing financial and digital vulnerabilities
Digital Security Shield - Protecting Online Data and Information.
Conceptual illustration showing cloud security vulnerabilities with a knife pointing towards a tent inside a cloud icon.
Contrast of protection and vulnerability depicted by hands holding shields
Business team identifying a vulnerability point on a strategic network map, planning and risk management concept.
A stark black silhouette depicts a person lying prone on a hospital bed or gurney illustrating themes of illness rest or vulnerability silhouette
Student struggles with peer pressure and social anxiety, isolated by haunting shadows of bullying in a classroom, depicting emotional distress
Exploit icon collection designed for web and mobile applications, featuring warning symbols, vulnerability indicators, and modern security graphics suitable for cybersecurity interfaces
Complex network of digital security shields under cyberattack, illustrating a critical breach in modern data defense systems and online protection vulnerability
Minimalist outline illustration of a fractured protective barrier depicting vulnerability and damage
Futuristic chrome humanoid legs on cracked glass surface with stone, cybernetic strength and vulnerability concept at sunset
Browser window icon with microchip and bug symbol representing software malware virus debugging computer security web development and system vulnerability
Illustration of interconnected devices and networks in a cybersecurity context
A bird's nest with an egg inside viewed from directly above in a natural setting
Vulnerability assessment and risk analytics icon set with vulnerability
A business continuity and digital protection scene representing vulnerability assessment as a safeguard against threats, where a coordinated team identifies and resolves issues
Conceptual illustration of database security, data protection, and server architecture.
Cybersecurity training session in a modern office setting with employees learning about data protection and network security protocols
Black and white illustration of broken chains padlock and shattering links representing security breaches and vulnerabilities
computer cyber security icon sign vector
Next page
/ 10