Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
System Vulnerability Icon
Vulnerability Methods Icons. Pixel art icon set of vulnerability assessment methods: CVE database, risk matrix, asset inventory,
Shield Slash Outline Icon
Risk Vector Design Icon Style
Bug fixing doodle for improve website performance
Disruption Icon
Open hands symbolizing giving and receiving, harmony and connection
Risk Icon
Data Breach Icon
Collection of white security icons displayed on a black background, representing protection and safety.
Decryption Icon
Cyber Attack Solid Black Icon
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
student sitting on the floor with knees pulled close, looking contemplative
Security Breach Icon
Hacker trying to break into a website security system with skull
Data Center Security Cloud Server Protection with Technicians.
Key next to bug icon with rotating arrows, calling attention to security risks, software flaws, and data protection. Ideal for cybersecurity, hacking, encryption, internet security, software
Various icons representing different human emotions and mental states depicted in a simple, monochromatic style for educational purposes
Security Testing Icon
Cyber Threat Icon
Vulnerability Management Icons. Solid, Filled icon set of vulnerability management: vulnerability scanner, patch rollout truck,
Misconfiguration Icon Lineal Syle
A distressed man holding a heart symbol in his chest, expressing sadness and emotion in a flat vector illustration, showcasing vulnerability and human feelings in a poignant scene
Risk Icon
Disruption Icon
A broken chain link symbolizes a compromised connection or security breach.
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Risk Icon
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Exploit Icon
Security pursuit showing a thief running away with a password being chased by a policeman, illustrating data protection and cybersecurity.
Security Outline Color Icon
Broken shield icon black and white vector sign
Tiny Boat in Giant Wave Silhouette
Security shield icon set with lock star checkmark bolt broken and keyhole featuring black and white symbols
Recognizing elder abuse, physical, psychological, economic, and environmental signs
Risk Icon
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Vector Detailed cracks and fissures in black and white.
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Software Security Blue Icon
Penetration Testing Icon
Risk Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Child sitting on floating refrigerator in flood, hugging dog with sad expression, surrounded by rising water and distant houses, conveying a sense of loss and vulnerability
Zero Day Icon
unlocked computer access icon sign vector
 risk
Unlocked lock illustration representing vulnerability and security in a colorful design
Symbolic representation of vulnerability and growth in a minimalist design
Bug Icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Cyber Security Icon Set Featuring Protection, Shield, Data, Encryption, and Firewall Concepts in a Professional, Clean, and SEO-Optimized Vector Style
Set line icons of risk management isolated on white
Silhouette of children working with tools for world day against child labor illustration art
Supply Chain Risk Icon
Man holding smartphone surrounded by warning alerts, phishing scam messages, suspicious calls, cyber threat notifications, online security risks, digital danger concept
Shattered Glass Silhouettes: Nine Broken Circle Patterns, Black & White
DAST blue gradient concept icon. Dynamical analysis, web application. Security testing. Round shape line illustration. Abstract idea. Graphic design. Easy to use in infographic, presentation
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Login Password Laptop Composition
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Exploit Icon
Patch software web banner or landing page. Operating system updates
Crying child with teddy bear sits amidst rubble, expressing deep emotion in a minimalistic setting, evoking feelings of loss and vulnerability with copy space
Cyber Threat Icon
Flat illustration of man managing cybersecurity for remote work telecommuting security
Collection of hand drawn doodle icons representing cybersecurity and data protection concepts silhouette isolated on white background
Hacker Solid Black Icon
Understanding cyber security hacker attack and data protection with cloud security concept icon set editable stock vector illustration
Vulnerability Icon
Rhino in Sepia: A powerful rhino stands boldly in its natural habitat, rendered in a sepia tone, against an illustrative background that captures the essence of the wild.
Cyber Security Icon Set Featuring Protection, Shield, Data, Encryption, and Firewall Concepts in a Professional, Clean, and SEO-Optimized Vector Style
Flat Illustration Business Team Meeting, Project Planning, Data Analysis, and Strategic Collaboration
Lock and skull signifying cyber threats, gear symbolizing system operations. Ideal for security, hacking, IT systems, network protection, software vulnerabilities, data breaches, simple landing page
Protection and Security Concept
Exclamation point on screen, System error, security warning alert, Cybercrime, Vulnerability, Computer virus, Ransomware, or bug, Critical , Malware, Technical error.  Flat Cartoon Vector Illustration
Emotional Vulnerability Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Security Pipeline Icons. Isometric Flat icon set of security in deployment pipeline: static code analysis, vulnerability scan,
Cyber attack and security threat concept. Hand holding phone with error message, virus warning, and spam alert. Hacking, network failure, data breach, malware, phishing danger vector.
Data breach and information leakage after cyber attack tiny person concept, transparent background. Hacking threat and privacy danger after connection vulnerability illustration.
Exploit Icon
vector icon of a document with a shield with a blue background in the shape of a shield
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Cyber Threat Icon
Cybersecurity Threat Fixer: Software Vulnerability Repair And Patching Implementation
Cybersecurity Specialist Reviewing Code For Security Vulnerabilities And Threats
Vulnerability Icon
Data Protection With Shield And Lock Security System Against Cyber Attack
The Importance of Empathy and Active Listening in Effective Communication Within Relationships
Woman holding her throat with both hands, experiencing discomfort
Melting Lock Digital Security Vulnerability Illustration
Cybercrime concept vector with hacker stealing passwords via phishing attack. Data breach, malware, internet security threat, identity theft, and computer fraud illustration.
Configuration Vulnerability Assesement
Hacker in hoodie at laptop committing cyber attack. Cybersecurity concept with world map, network, shield, and lock icons. Data breach, phishing, and online crime vector illustration.
Vpn security icons vector set for network protection and data privacy internet safety and secure connection
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Next page
/ 10