Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Cracked shield soldier symbolizes defeat broken chain represents weakness and failure vector
Technical support infographic 5 steps. Computer maintenance. Network repair, internet. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used
Cybersecurity With Icon Set Design
Protection and Safety Icon Shield and Broken Bone symbolizing Injury Prevention and Health Security
HACCP icon set containing hazard, analysis, critical, control and points vector icons.
Alert icons for urgent notifications and warnings
Urban Heatwave Thermometer Rising Over City Skyline, Illustrating Global Warming Effects
Set of four minimalistic vector illustrations of cracked shields, depicted with thin black lines on a white background, showcasing progressive stages of damage from minor cracks to complete
Abstract Shattered Glass Effect with Angular White Lines on Dark Gray Background.
Hardening Icon
Cybersecurity data protection shield with padlock for online privacy and network security illustration concept
Cybersecurity warning alert concept. Hand holding glowing exclamation mark icon. Digital system error, malware threat, data breach, hacking risk, computer security failure, caution sign
Human behavior icon set. Human behavior vector symbol in black filled and outlined style.
Vulnerability Path Modern and clean web banner illustration featuring thematic icons for visual communication
Collection of thin line cybersecurity icons representing data protection and network security
Risk assessment process from identification through analysis and evaluation to prioritization and mitigation strategy.
Breaches Icon In Line Version On Black And White Background
Digital Security Icons Communication, Warning, Threat, and Protection Symbols
chain, paper clip, office supplies, simple shapes, minimalist, vector graphics, geometric shapes, primary colors chain vector icon
A man tenderly cradling a human skull a poignant and symbolic illustration
Hand-drawn sandcastle being destroyed by a large crashing ocean wave in a black and white sketch style, a metaphor for failure, fragility, and impermanence
A collection of network security and communication technology line icons
cyber security icon minimalist glyph illustration for antivirus platforms, encryption service ranking optimization, online privacy apps, secure authentication solutions, perfect for professional tech.
hacker silhouette engaging with a network via a glowing laptop, symbolizing advanced cybercrime and digital security challenges
Collection of ten cracked shield line icons on a white background, representing security breaches, data protection failures, and system vulnerabilities. Each icon features a distinct crack pattern
Set of 15 Cracked Shield Line Icons, symbolizing broken protection, vulnerability, and security breaches, perfect for graphic design, book illustrations, advertisements, and app interfaces, presented
Collection of ten cracked shield line icons, representing vulnerability, damage, and broken security, suitable for web, books, cards, and apps, presented as a vector cartoon illustration on a clean
Weakness, broken chain links icon vector. failure, vulnerability, needing repair symbol. vector illustration.
Computer Programing icon collection set. Containing performing, cpu, computing, integration, testing, analysis, generating, algorithms, hardware and debugging icon. Simple flat vector.
Secure Coding Icon
Collection of broken shield line icons, representing security breaches, damage, and vulnerability. Includes various cracked, shattered, and damaged shield symbols for graphic design, web, apps, and
Collection of risk management icons in various shades of blue on white background
Risk Study Icon Set Vector Collection Isolated In Black And White
Vulnerability Path Modern and clean web banner illustration featuring thematic icons for visual communication
Secure technology solutions for your business with these professional system management icons offering data protection and reliable security measures
Risk assessment process from identification through analysis and evaluation to prioritization and mitigation strategy.
Cybersecurity and digital protection line icon set. Vector pictograms of networking, data defense, security lock, and vulnerability, thin linear illustration.
Cybersecurity threat analysis, database scan, signature library protection
Computer Bug Icon Set in Black Vector Illustration Featuring Malware Symbols, Error Graphics, Security Alert Elements, and Modern Tech Icons for Digital Interface, Software Design, and Cyber Concept
Coastal road collapse: storm driven erosion & environmental catastrophe Vector, illustration
Set of 15 cracked shield symbols, drawn with thin lines, presented as vector cartoon illustrations on a white background. This ordered collection features various stages of shield damage, from minor
Broken shield line icon set. Security risk and vulnerability concept. Unsafe defense and protection failure. Hacked system or data breach metaphor. Cracked and damaged signs.
Digital vulnerability of systems. A shield that is split into two parts on the background of the tracks of the board. A symbol of cyber threats, security breaches, and cybersecurity breaches.
Data center server rack engulfed in flames and smoke with damaged cables on floor, concept for system failure illustration, data loss warning and cybersecurity risk awareness
Anatomical Heart Rib Cage Art: Vintage Engraving & Gothic Love Symbol
Cyber security shield protecting data with glowing digital innovation aura
CTEM icon set containing scoping, discovery, prioritization, validation and mobilization vector icons
Silhouetted couple in intimate embrace, sharing a tender moment of connection.
Trust  Solid color and black line drawing vector illustration set
Escalation Icon
Cybercrimes vector icon set. Cybersecurity linear icns pack. Includes symbols or hacking, malware, phishng, virus, firewall, ransoware, spyware, protection nd more.
A large hand places a coin on a stack of documents above a group of silhouetted people holding hands.
Threat Mitigation Icon
Vulnerability Path Modern and clean web banner illustration featuring thematic icons for visual communication
Black and white icon of a database server losing data protection from a cracked security shield
Configuration Vulnerability Assesement
Anonymous figures working on laptops surrounded by digital glitch effects
Black and white illustration of flooded homes and rescue efforts underway
The concept of secure system and network protection technology. Cybersecurity technology background. For banners and templates. EPS10.
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Vector light Risk management process diagram schema
The word pain shattered by shards of glass on a clean white background with bright light effects
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Hacker activity icon set collection. Simple color fill vector.
傷ついた盾のシンプルなイラスト
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Broken chain link symbolizing weakness and failure
Security Breach Icon
Cybersecurity and network defense line icon set. Vector pictograms of firewall, biometric security, malware, and risk management, thin linear illustration.
Penetration Icon
Disempowerment Icon Pack Multistyle Illustration
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Cyber threat Icon
Vulnerability Path Modern and clean web banner illustration featuring thematic icons for visual communication
hacker logo. vector. editable.
Penetration Testing Icon
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Security system icon set featuring alarms, detective, fingerprint, vulnerability, network, system,  and surveillance symbols for safety, monitoring, and protection projects.
Abstract technology security global network background, vector
Emotional Intelligence icon set. Containing empathy, respect, resilience, compassion, mindfulness, expression, motivation, optimism, forgiveness, kindness, patience icon. Glyph style
Risk Assessment White Icon Set Design
Broken chain with OFF text down arrow and electrical plug
Sensitivity Icon In Black And White Glyph Style
Cybersecurity and digital protection concept with shield and network.
Broken shield icon simple vector isolated symbol
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Powerful symbolic art capturing emotional depth, tears transforming into precious gems symbolizing resilience and inner value
Broken padlocks illustrating security breach or failure
Breach Icon
Surveillance Analytics Line Blue Icon Set
CTEM icon set containing scoping, discovery, prioritization, validation and mobilization vector icons
Security Testing Icon
Vulnerability Path Modern and clean web banner illustration featuring thematic icons for visual communication
Cybersecurity and risk management line icon set. Vector pictograms of shield, padlock, fingerprint, and data analysis, thin outline illustration.
Phishing icon set. concept of internet scam, online fraud and cyber security, isolated on white background. vector illustration on white background.
Cyber Security Icons: a comprehensive set of meticulously crafted line icons representing various aspects of digital safety and data protection.
Broken chain symbolizing weakness and resilience
Three dark teal padlocks arranged in a group on a light gray background security concept illustration
Two hands, one above the other, in a protective or caring gesture.
Next page
/ 10