Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Cyber Threat Icon
Online transaction vulnerability linear icon. Cybersecurity problem. Data breach. Hacking attempt concept. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke
Risk Icon
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Cyber Defense Icons: a collection of detailed and visually engaging icons, perfectly tailored to represent various aspects of cybersecurity. The icons are crisply designed.
Hacker Logo Design Illustration
Icons for phishing, email scams, data breaches, and cybersecurity risks in vector format.
Mutual Support Giving up seat in public transport -modern flat vector concept illustration of man offering his seat to elderly woman on bus A metaphor of voluntary, collaborative exchanges of services
Information Technologies Horizontal Banners
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Risk icon vector image. Can be used for Compilance and Regulation.
Abstract technology security global network background, vector
A touching illustration of a young woman sitting in a reflective pose, representing deep thought and hope, ideal for discussions around mental health and self-care.
Information Security icon set blue highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
malware, cyber attack line vector icon
Threat Icon
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Fairskinned woman uses a laptop with two padlock icons alongside her figure on a light backdrop
Recognizing problems and addressing system malfunctions is crucial for maintaining operational efficiency and preventing further complications in network performance, silhouette
Vulnerability Icon
System Vulnerability Icon
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Breach icon multiple style
Collection of Broken Doors, Depicting Vulnerability and Damage
A vibrant image illustrating the concept of detecting bugs in technology, bugs on a circuit board under magnification.
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Editable vector icons for phishing, online security threats, and cybercrime. Includes symbols for phishing emails, fraud, hacking, data breaches, and online safety warnings.
Data Breach
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
vulnerability
Protection background. Technology security, encode and decrypt.
Print
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Zero-day exploit web banner or landing page. Computer-software
Businessman superhero with a shield protecting from cyber attack. Security, safety, and privacy concept. Data protection, antivirus, and insurance metaphor for business.
Woman works on her computer secured by lock icons against background transparency
Silent Anguish: A digitally crafted portrayal of a person, eyes closed, hands cradling the face in a pose that expresses distress, invoking empathy.
Online Robbery Icon
Cyber Threat Icon
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline concept vector illustrations
Elderly man walking with cane under tree silhouette in black and white illustration
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
3D Cartoon Ecology Metaphor
find strength in vulnerability kindness art. Groovy retro vintage hippie spiritual girl aesthetic message. Cute love text shirt design and print vector
Security vector illustration word cloud isolated on a white background.
Illustration showing various cybersecurity icons including firewalls and data protection methods
Security assessment icon set multiple style collection
vulnerability
A man's silhouette finds shelter from a tempest under an umbrell
Sql Injection
Adobe Illustrator Artwork
Insecure Teenage Boy Lacking Confidence Under Pressure of Unrealistic Masculinity Expectations, Emotional Struggle, Self-Doubt, Mental Health Concept, Vector Cartoon Illustration
Security Icon
Cloud computing security breach for internet of things
Cartoon hacker with red hoodie uses a laptop surrounded by colorful padlock icons
Solitary Reflection: A person sits alone within a spotlight's glow, enveloped in an atmosphere of introspection, emphasizing human emotion and the complexities of solitary moments.
Market Data Icon  in black line style icon, style isolated on white background
System Vulnerability Icon
Broken link RGB color icon. Hyperlink that no longer points to its original destination. Error in webpage working process. Isolated vector illustration
Cyberstalking concept. Online surveillance and privacy invasion. Anxious employee at computer watched by hacker. Internet security threat, data theft, cybercrime. Workplace spy.
thin line risk management or search of vulnerability
Cyber security outline icon set. Internet protection, data privacy, secure browsing, network vulnerability, virus, malware, bug, and computer infection vector symbols.
Print
System Vulnerability Icon
Understanding Cloud Computing Errors and Connectivity Issues Prompting System Alerts and Warnings Affecting Network Performance
Blind businessman metaphor for risk, failure and crisis. Lost cartoon manager walking into traps, facing financial problems, dangers, and mistakes. Business concept vector.
A simple illustration depicting two figures in a restroom setting.
Film noir crime scene with woman running from a stalker. Frightened female victim escapes a shadowy pursuer in a dark city alley at night. Concept of danger, fear, suspense.
Claustrophobic journey: A man's arduous crawl through confined u
Global Network Security Protecting Data Worldwide
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Insecure Teenage Boy Lacking Confidence Struggling with Unrealistic Masculinity Expectations, Emotional Vulnerability Concept, Mental Health Awareness, Vector Cartoon Illustration
Security warning Icon
Illustrations showcasing varied emotional states interpersonal dynamics monochrome drawing of
Homeless People Sleeping on Park Benches Silhouettes
Secure Cloud Computing Data Protection and Privacy
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
System Vulnerability Icon
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Cartoon office worker on laptop under hidden hacker stalker surveillance from shadow, illustrating online privacy invasion, workplace cybersecurity breach and digital spying threat vector illustration
Thief Stealing Money Tree from Businessman's Head, investment loss, stolen ideas, fraud, intellectual property theft, economic downturn, financial crime, create engaging visuals,
Hacker attack and web security metaphor. Cyber criminal with laptop stealing user personal data. Internet phishing, fraud and identity theft concept. Privacy data protection.
Hacker attack concept vector icon. Cyber crime and web security metaphor. Anonymous man with laptop. Computer data breach, phishing, malware, virus threat. Cybersecurity.
Mobile phone banking scam, fraud link to steal money. Phishing bait website or online crime concept. Thief steals money from mobile banking app. Hacker cybersecurity crime.
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
Blind businessman navigating a field of traps, a business metaphor for risk, danger, and crisis. Conceptual vector illustration of failure, uncertainty, challenge, and mistakes.
Six icon Illustrations Representing Online Phishing and Cyber Security Threats with Creative Visuals
Concept of fear and danger. Scared woman runs from a shadowy pursuer in a dark city alley. Victim of crime, stalking, and harassment escaping a menacing threat. Noir style.
Monochrome Depiction of a Figure with Possessions Wrapped in Pla
weathered wooden pier partially submerged in water showcasing a flood scene  Illustrative style clear composition evokes a sense of vulnerability and nature's power
Safe mode technology icon in the technological comb bacground
Vector Risk management process diagram schema
Troubleshooting mobile application errors resolving technical glitches and providing effective user support solutions for digital platforms
Wrecking Ball Hits Falling Dominoes Metaphor for Business Crisis, Financial Risk, Instability, Chain Reaction, Failure, Economic Collapse, Disruption, Uncertainty, Setback Vector Illustration
Data protection and network security concept with shield and lock. Cybersecurity technology illustration with password, key, hacker attack, spam, and privacy access control.
Cybersecurity Shield with Lock and Network Nodes Icon
Next page
/ 10