Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Vulnerability Icon
blonde woman delicately covers her eyes conveying a sense of vulnerability against a muted cityscape backdrop.
A senior citizen receives a COVID-19 vaccination, highlighting healthcare workers' dedication and the elderly's vulnerability to the virus.
Insecure Icon
Pleading Face Emoji
51 Attack Outline Icon
Abstract technology security global network background, vector
Risk Vector Design Icon Style
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Vector hand drawn cartoon illustration of a green dragon monster mascot character, sword and fly swatter in hand, protecting computer from bug virus malware attack
mortality death life aging icons set vector
 Comprehensive Vulnerability Scanner Icon
shield X line icon
Cybersecurity threat concept. Hacker phishing for sensitive data from server. Data breach and cybercrime illustration. Security vulnerability, malware attack, and internet fraud.
Escalation Icon
Broken security shield icon, vulnerability or system breach symbol. Damaged protection and compromised safety graphic, cyber attack or failure illustration design.
A woman trapped within a complex, chaotic web of tangled threads symbolizing deceit and lies.  Her expression conveys vulnerability and despair.
Exploit Icon
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Maintenance smartphone technology search system
Threat Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Online Robbery Icon
Trapped and Needing Help
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Two women expressing emotions in a minimal style, one thoughtful and one distressed, conveying a sense of vulnerability in vector illustration
vulnerability
email with virus, phishing vector icon
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Cloud computing security breach for internet of things
Vulnerability Icon
Sad boy crying holding teddy bear in yellow shirt vector illustration
Exposure Icon
Disempowerment Glyph Blue Grey Icon
Patching Icon
Sql Injection
Shield on a futuristic digital background. Concept of cybersecurity, antivirus protection and secure data transfer in a high-tech environment. Protection of information and Internet projects.
Zero Day Icon
Risk Management Icon
A darkhaired man embracing a blonde tearful child suggesting comfort or consolation
A minimalist sketch of a figure sitting in a posture of sadness and isolation.
Single transparent shrimp against deep blue ocean, minimalist composition.
Risk Icon
Adult Aggression and Child Vulnerability
Flat illustration of woman developing secure software with security shield and programming code
1045 - Data Leak Concept Illustration
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Firewall Breach Vector Illustration Concept of Network Security Attack
QR code and tag on a smartphone beside a geometric Trojan horse and metadata tag. Ideal for cybersecurity, data encryption, digital banking, vulnerability awareness, digital threats, online payments
Vector outline broken padlock icon representing security risks and vulnerabilities
Distressed figure in monochrome with flowing paint, conveying vulnerability
Businessman using hypnosis with pendulum to influence employee. Vector concept of corporate manipulation, mind control, persuasion, suggestion, trance, compliance, and workplace power dynamics.
Hardening Icon
Vulnerability Assessment Icon
Expressive hand-drawn vector illustrations featuring silhouettes of figures in various poses of contemplation and vulnerability
Vulnerability Icon
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Earth in Distress cry
Cybersecurity Process: A visual representation of a circular process highlighting key elements of cybersecurity, including enhanced privacy, user control, secure management, and reduced risk.
Security analysis or risk assessment, vulnerability assessment or threat detection, security audit or compliance check, data protection or encryption evaluation, network security or perimeter defense,
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple color vector
The Impact of Cyberbullying
A black outlined triangle encloses an exclamation point on a white background, expressing warning
Unsafe Icon
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Shattered self-image. Broken mirror reflecting a fractured male face. Concept of identity crisis, mental turmoil, psychological distress, inner conflict, and despair. Hand holding mirror illustration.
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
Cybersecurity breach concept. Hacker stealing confidential documents and data from a laptop. Cybercrime vector illustration with a broken lock, warning sign, and internet thief. Security risk.
Vector outline unlocked padlock icon representing security vulnerabilities
Smartphone security vector concept featuring shield and padlock icons protecting device from hacker attacks and virus malware threats. Mobile cybersecurity and data privacy illustration.
Shield Slash Solid Icon
Patch Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
Exploit Icon
Digital Shield: Protecting Your Data in the Cyber World. Secure Network, Data Privacy, Cyber
A hooded figure hunched over a glowing laptop in a dimly lit room, intensely focused on breaching a firewall, digital code cascading across the screen.
Hacker at computer, cybersecurity threat concept. Vector illustration of data breach, phishing, internet crime, and malware. Digital security, privacy protection, and network safety.
Online scam alert. Distressed man victim of cybersecurity threat, hacker on smartphone. Phishing, malware bug, data theft. Internet fraud, digital vulnerability, online safety, tech support concept.
Safe mode technology icon in the technological comb bacground
Parental Conflict and Child Impact
Hardening Icon
50 cybersecurity icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Vulnerability Icon
Honeypot Icon
Exploit Icon
Vulnerability Icon
Exploit Icon
Childhood Fears and Nightmares
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Zero Day Icon
Bullying and Distress
ear and Nightmares
Depressed Woman with Trauma from Bullying
Online Manipulation and Social Engineering
51 Attack Blue Icon
Cyber attack and data breach concept. Hacker stealing confidential information from laptop. Cybersecurity threat, phishing, identity theft, privacy violation and online fraud.
Next page
/ 10