Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Camping Bundle. Refugee Camp Night Collection Illustrations
Programmers collaborating to resolve bugs and vulnerabilities within a document management system, enhancing data security and maintaining integrity throughout the process
Software Security Blue Icon
Cybersecurity vulnerability concept with shocked woman and broken padlock. Data breach, hacker attack, and system error. Internet security failure, privacy threat, and digital protection compromised.
Blindfolded Woman Looking for Love Vector Illustration. Lady with scarf covering her eyes being let by intuition and trust
Security Risks Icon Style
Risk Factor Blue Black Icon
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Failure Mode Flat Icon
Patching Icon
An illustration of three business professionals working together on a cybersecurity strategy, with a large shield icon prominently displayed.
Exploit Icon
Browser Coding Icon Vector Element
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Security Testing Icon
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
Mutual Support Giving up seat in public transport -modern flat vector concept illustration of man offering his seat to elderly woman on bus A metaphor of voluntary, collaborative exchanges of services
Vector hand drawn cartoon illustration of a green dragon monster mascot character, sword and fly swatter in hand, protecting computer from bug virus malware attack
Man in Crosshairs Target Audience Risk or Targeted Marketing Concept
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Camping Bundle. Abandoned Factory Remnants Collection Icons
Alert message interface indicating a potential system problem, requesting user awareness and prompt action to safeguard against further implications
Risk icon vector image. Can be used for Compilance and Regulation.
A man holding a red heart in his hands with a concerned expression in a flat vector illustration depicting emotional vulnerability and introspection
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Silhouette of a hacker holding and using a laptop while standing
Risk Icon
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Elderly man with trembling hands, his wrinkled face reflecting wisdom of years and touching vulnerability of aging.
Breach Icon
Two women sharing a heartfelt moment of support in flat vector art
Exploit Icon
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Render a realistic image of a human heart, weeping crimson tears, heavily bandaged and secured with safety pins.  Focus on the raw emotion and vulnerability.
Vulnerability  Icon Set Multiple Style Collection
Two people fixing cybersecurity issues on a large screen with charts, warning signs, and hacker icons. Digital security and system maintenance concept. Vector illustration
A Man in Despair Seated on the Ground Holding a Cup in a State of Poverty and Need for Charity
Security Icon
In a quiet indoor setting, a handsome man with blue hair is thoughtfully holding his head in a contemplative posture. His expression reveals deep emotion, with a hint of sadness.
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Camping Bundle. Refugee Camp Tents Collection Illustrations
Shield Slash Outline Icon
Cracked computer screen with bug, concept of cybersecurity vulnerability
Penetration Testing Icon
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
 Icon of Vulnerability for Security Management
Cracked Egg Shell, Broken Eggshell, Simple Illustration
Insider Threat Icon
Elderly man with trembling hands, his wrinkled face reflecting wisdom of years and touching vulnerability of aging.
Vulnerability Icon
Computer Outage, System Failure, Software Error, and Cyber Attack Disruption Concept
Vulnerability Outline Color Icon
Black Silhouette of a Hedgehog – Rounded Body with Spiky Back, Sharp Quills, Small Face, and Tiny Legs, Symbolizing Cuteness, Nature’s Resilience, and the Innocence of Forest Wildlife
Exploit Icon
A dark silhouette of a damaged house with visible cracks and an orange explosion emanating from its side
Financial bug or vulnerability icon, insect with dollar sign symbol. Software flaw impacting money graphic, coding error or exploit in finance system illustration.
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
A shadowy figure, digitally manipulated, symbolizes the hidden perpetrator of cyberbullying, highlighted by a single spotlight.  Illustrate the vulnerability of the victim.
Threat icon
vulnerability
Camping Bundle. Abandoned Factory Remnants Collection Illustrations
Vulnerability Icon
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Risk Icon
3D Cartoon Ecology Metaphor
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
3D Internet Spam, Mobile Fraud Alert, Phone scam, Online Warning. Malware Spreading Virus, mobile fraud alert warning notification. Spam Distribution. 3D Vector isolated illustration background
Supply Chain Risk Icon
Abstract symbols web banner templates set
Detection Icon
Abstract technology security global network background, vector
Security Outline Color Icon
Hacker in the Shadows: An anonymous figure in a hooded sweatshirt intensely focused on a computer, symbolizing cybersecurity threats and digital crime in the digital realm.
mortality death life aging icons set vector
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Broken security shield icon, vulnerability or system breach symbol. Damaged protection and compromised safety graphic, cyber attack or failure illustration design.
network global security icon with shield
Cybersecurity threat concept. Hacker phishing for sensitive data from server. Data breach and cybercrime illustration. Security vulnerability, malware attack, and internet fraud.
Protection background. Technology security, encode and decrypt, techno scheme
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Camping Bundle. Apocalyptic City Destruction Collection Illustrations
Maintenance smartphone technology search system
Trapped and Needing Help
Penetration Testing Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Security Risks Icon Style
vulnerability
Risk Assessment Icon
Abstract symbols flat design long shadow glyph icons set
Vulnerability Icon
email with virus, phishing vector icon
51 Attack Outline Icon
Cloud computing security breach for internet of things
mortality death life aging icons set vector
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Brute force attack icon, hammer and keyhole symbol. Exploiting security vulnerability graphic, system penetration or data breach tool illustration for cybersecurity.
Sad boy crying holding teddy bear in yellow shirt vector illustration
Achilles' Heel
Sql Injection
Risk Management Icon
Next page
/ 10