Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Flat illustration of man managing cybersecurity for remote work telecommuting security
Firewall Icon Set Multiple Style Collection
Hand-drawn engraving representing different cybersecurity threats, from data storms to vulnerabilities, and ending with a protective shield, for a concept of digital safety.
Security Vulnerabilities Flat Icon
Threat Detection Icon Set Multiple Style Collection
A striking illustration of a broken chain link representing weakness and the end of a connection, ideal for projects conveying concepts of failure, freedom, or overcoming challenges in
Data Breach Icon Sheet Multiple Style Collection
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Security Audit multistyle icon
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Hand drawn line art emotional icon set featuring broken hearts, crying eyes, and lonely figures for themes of heartbreak and grief
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Security, privacy, and protection symbols: black silhouette vector icons on transparent background
Silhouette of a brave rescuer wearing a helmet and flotation vest carrying a small child while wading through floodwaters with essential supplies over his shoulder symbolizing hope and aid
user protection icon sign vector
Social vulnerability icon set, diverse population symbols, support group graphics, healthcare and policy visuals, inclusion and equity design elements
Climate change: person on a small island with rising water
Computer Problem User Composition
Four open padlocks showing different styles of broken security
Adobe Illustrator Artwork
Black line icon set illustrating adversarial attacks and AI model security concepts like poisoning, evasion, threat simulation, robustness testing, and defense mechanisms for cybersecurity
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Server data security network protection infographic template layout
Security Breach Icon Set Vector Collection Isolated In Black And White
Collection of Security Shield Icons and Symbols.
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
risk Two-tone version in black and white background
Abstract Silhouette of a Tent with Cracked Ground.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Virus Icon Set Multiple Style Collection
Cybersecurity Shield Network Protection.
Cybersecurity concept warning on hacker laptop
Valentine y26 (27)_traced
Safety & protection solid icon set for security, shield, compliance, emergency, security, guarantee, privacy, document, network ,risk management. vector, editable.
Black Shield Icon with Open Padlock Symbolizing Security.
Cyber security and data protection icons with locks shields bugs and firewalls symbolizing network defense and threat prevention
System Vulnerability, Cyber Bug, and Encrypted Document Security Icons
Internet Security Isometric Design Concept
Outline neon pc malware icon set. Glowing neon system unit and monitor screen frame with bug sign, cyber security hack pictogram. Error debug, software bugs, hacker and virus attack.
Two people covering their faces with hands a striking black silhouette
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Cyber Risk and Threat Detection Icon Pack for Security Monitoring and Incident Response
Computer screen with warning signs, bug icons, and coding elements on a modern background, representing a cybersecurity breach concept. Vector illustration
Illustrations depicting the stages of aging in elderly women with walking sticks
Hardening Icon In Black And White Glyph Style
an elderly woman coughing with virus particles spreading in the air. The image highlights health risks, virus transmission, and vulnerability of seniors to infectious diseases. Suitable for healthcare
risk multiple style collection
Silhouette of Woman and Birds: A striking silhouette showcases a woman intertwined with a flock of birds, evoking a sense of vulnerability and surreal beauty.
Software quality assurance, cybersecurity firewall, system, software icon
A striking black shield icon with a classic design beautifully rendered as a bold silhouette
Three black hearts depicting stages of damage a striking silhouette
System administrator online service or platform. Technical work with server
Training icon set multiple style collection
Cyber Threat Icon Sheet Multiple Style Collection
Broken shield icon Simple thin outline
whisk_8b13dz_via_RJ_Whisk_Auto.eps
Collection of security-related icons depicting surveillance, access control, and alert systems for safety applications
Risk management mind map flowchart business concept for presentations and reports
Set of Antivirus line icon. Pictograms of software, threat, safety, tech, security, anti, defense and more. Outline icons pack. Protect icon set. Editable stroke. Pixel Perfect.
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Two people in distress a visual representation of sadness and despair silhouette
Disaster risk level infographic showing circular chart with risk categories and bar chart illustrating risk distribution, with icons representing weather, medical aid, and housing
Repeating silhouette of a grieving person isolated on transparent background
Digital lock protect data flow in global network
Exploit Icon In Black And White Glyph Style
NDA Protection Secure Your Confidential Information with a Non-Disclosure Agreement
Computer Security Bug Icon
Print
Set of a collection of cyber security icons suitable for web and mobile application. Set of glyph blue style icons with secure, engineer, vulnerability, malware, phishing, and more icons
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Security shield and lock logo design representing protection and safety concept.
Vulnerability Multistyle Icon Set
Cyber Security Icons Set Shield Protection Data Network.
Comprehensive vector icon set showcasing digital security shields with intricate circuit board patterns, symbolizing robust cybersecurity, data protection, and online privacy solutions for technology
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Vulnerability Icon Set Vector Collection Isolated In Black And White
Protection background. Technology security, encode and decrypt, techno scheme
Abstract technology security  global network background, vector
Weaknesses icon set in line and glyph style on black and white background
Dark Web Icon Set Multiple Style Collection
The Ultimate risk Styles with Variations Line of icon set vector illustration
Route misdirection, sad face, downward trend, bug warning on URL bar. Ideal for cybersecurity, navigation error, data loss, online risks website threats analytics warning concepts. Clean flat
Baby footprints one dark and one outlined a simple graphic silhouette
Bullet holes and impact patterns displayed in a grayscale arrangement
Cyber Security icon collection set. Simple color fill vector illustration.
Cybersecurity line icon set with padlock shield firewall user fingerprint cloud code globe and bug symbols
Home Security Protection Lock Safety Concept.
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Business IT Security Concept Design, Mesh of Connected Network Client Nodes
Comprehensive Digital Security Shielding Network Infrastructure from Cyber Threats and Data Breaches
A distressed figure sinking and a reaching hand emerging from dark waters
Stylized white line art illustration of a human hand reaching out from a dark black background, concept of seeking or emergence.
Cute chick standing next to broken eggshells on ground
Data Breach icon set. Includes data, breach, cyber, attack, hacking, leak, exposure and More. Editable Stroke Icon Collection.
Silhouette of a woman curled up in despair with scattered dark petals symbolizing loss
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Security Audit multiple icon
Security Practices Icons. Operational Security Practices set in outline vector style: policy document, risk assessment chart, vulnerability scan icon, patch
Cyber security threats on smartphone. System vulnerability warning. Mobile phone hacking. Cybercrime or antivirus concept. virus, malware, ransomware, or bug. Flat cartoon icon. Vector illustration.
Frayed rope symbolizes tension and potential breaking point.
Next page
/ 10