Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
This outline icon illustrates a state of damage or breakage, emphasizing repair, destruction, or fault within a comprehensive pictogram series.
Cybersecurity breaches, malware, coding, software vulnerabilities, hacking prevention, online protection. Developer writing code, bug and Trojan horse symbols. Cybersecurity and malware ion
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
A graphic illustration of low, medium, and high risk gauges on a white background
Simple black line drawing of an unlocked padlock on white background.
Three padlocks in different states of security
Cybersecurity Evaluation Process. Cyber vulnerability assessment. Professional reviewing system components with checklists and alert icons, careful and
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Collection of security icons including locks and shields.
Cybersecurity Shield Network Protection.
Illustration of a single clear and pristine teardrop, conveying purity and symbolizing freshness or emotional vulnerability against a white backdrop
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Security icons for digital protection.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
A collection of black and white icons representing security and technology concepts
Frayed rope symbolizes tension and potential breaking point.
Green and Red Unlocked Padlock Icons Isolated
alien Vintage Contemplative Human Figure Engraving, Inverted Black White Xerography Vector for Laser Engraving on Dark Background
Cybersecurity, threats, data protection, online risks, security awareness, system vulnerabilities. Person working on a laptop alongside illustrated rockets marked as DOS and malware. Cybersecurity
Soldier with first aid kit helping crowd near submarine
Ethical hacking and cybersecurity icon set for security, featuring hacker, data protection, and network threat symbols for digital defense, white hat operations, and vulnerability assessment.
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Outline neon pc malware icon set. Glowing neon system unit and monitor screen frame with bug sign, cyber security hack pictogram. Error debug, software bugs, hacker and virus attack.
Computer Problem User Composition
Broken Circle Icon Representing Disruption and Imperfection.
Cybersecurity concept warning on hacker laptop
Abstract technological padlock illustration, intricately designed with circuit board patterns, symbolizing robust digital data protection, cybersecurity, and secure network infrastructure
脆弱性を表すシールド
Risk management mind map flowchart business concept for presentations and reports
System administrator online service or platform. Technical work with server
악성 이메일이 여러 사용자에게 전파되는 사이버 공격의 개념적 표현
Software quality assurance, cybersecurity firewall, system, software icon
Abstract technology security  global network background, vector
Cyber Security Icons Set Shield Protection Data Network.
Black silhouette of a fetus within a radiating circle with text
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Silhouetted Man Laying Flat, Arms Open, Reaching Upwards, Dreamy Isolation.
Cybersecurity, malware protection, online threat detection, internet safety, software vulnerabilities, hacker prevention. Address bar with bug symbol and upward arrow. Cybersecurity and malware
Broken shield icon Simple thin outline
Penetration Icon In Black And White Outline Style
Fractured Integrity: The symbolic image of a bar is fractured, representing the breakdown of structure, breaking point, and concept of disruption.
Understanding and preventing computer viruses and malware threats to digital security
Cybersecurity line icon set. Vector pictograms of monitor lock, email alert, shield, hacker, server, cloud, password, fingerprint, firewall, VPN, USB drive, warning, thin linear illustration.
et of modern magnifying glass with shield and arrow icons in black, white and blue, representing security and protection concepts for business and technology use
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Mobile Security icon set. Antivirus, Vishing, Phishing, Mobile Computing, Vulnerability, Phone Settings, Online Privacy, Face Recognition. Duotone color solid and editable outline icons
Protection background. Technology security, encode and decrypt, techno scheme
Security and compliance icon set: audit, encryption, data privacy, firewall, risk management
Risk Blue And White Icon Style Collection
Security warning icons alert shield danger protection symbols set
Shield of protection intertwined with a heart symbolizing security and care.
Computer Security Bug Icon
A collection of modern technology and security icons on a white background
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
Set line broken or cracked lock icon isolated on white background, unlock sign, colorful vector icons set representing security breach
A hacker exploiting vulnerabilities in interconnected digital systems and devices Vector, illustration
Security shield icon featuring an open padlock. Symbol for unprotected data, system vulnerability, open access, or deactivated firewall protection.
Breach Detection icon set multiple style collection
Risk Single Icon Pack Multistyle
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Cracked egg icon, broken shell and fragile object symbol vector design
Cybersecurity and Data Protection Icons Set.
Secure data network connection protection and cyber security concept
Print
Terrified woman is surrounded by frightening ghosts and shadowy hands as a representation of anxiety, fear, and mental health struggles.
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Cybersecurity icons: threats, alerts, and protective measures
Hacker in a dark hoodie types on a laptop, side view.
A detailed line drawing depicts a world globe cradled within two protective open hands symbolizing care and global responsibility high quality professional modern elegant
Open backdoor in a black wall cybersecurity concept illustration
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Flat colored artificial intelligence themed icon illustration
A dramatic lightning storm over a mountain range with a small house in the foreground
 risk
Risk  Icon Set Different Style Collection
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple line vector.
Broken chain link graphic with burst effect striking black silhouette
Adobe Illustrator Artwork
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Hands cradling earth a symbol of global protection and environmental care
Cybersecurity intelligence line icons collection. Threats, Breaches, Hacks, Malware, Vulnerabilities, Pentesting, Encryption vector and linear illustration. Firewalls,Intrusion,Phishing outline signs
hacker icon set multi style various collection
Vulnerability Multistyle Icon Set
Secure voting system with ballot box, padlock, shield, and molecular structure on light blue background, representing safe and protected
Broken padlocks illustrating security breach or failure
Cybersecurity icons illustrating network protection and threat management
Broken eggshell cracked open with visible cracks and lines
Risk
Supply Chain Risk Icon
Social volunteering or social care concept. With three illustrations of social workers helping elderly and disabled people. Flat vector illustration
Protección de las personas mayores o tercera edad.
Flat colored artificial intelligence themed icon illustration
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Next page
/ 10