Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
malware, cyber attack or virus line icon
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Vulnerability Management and analysis security hacker
Threat Detection multiple icon
Achilles' Heel
Symbolic broken mask and colorful brain, vulnerability and healing
Certified Ethical Hacker - CEH - icon set & web header banner
Risk management process, business vector concept
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Security Breach Icon
Broken Shield An of a shield with cracks and a lock falling out representing the weakening of digital privacy protections and the vulnerability to breaches.
Computer security specialist online service or platform. Idea of digital
Threat Icon
Phishing attack with hacker holding laptop with skull and crossbones, stealing data with email and fishing rod from surprised user with warning message
A cracked shield symbolizes compromised protection.
Security patch icon for software vulnerability fix
Shield vulnerability detection icon vector sign
A suited man, overcome with emotion, is depicted with a poignant and sorrowful face in a modern, black and white generative AI illustration, conveying vulnerability and sadness through a scratch
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Inner Sanctum: A silhouetted woman, nestled within a heart, embodies introspection and self-discovery, in a minimalistic yet impactful display of vulnerability and emotional strength.
Server with Down Arrow Representing Data Breach
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Cybersecurity Risk Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Woman wiping tears while sitting on a couch, emotional vulnerability
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Solid style icons of penetration testing tools: test probe, red team icon, simulated attack, pen test report, vulnerability exploit icon, access attempt, breach simulation, ethical hacker badge.
Alert and security technology research or find bug concept
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Security Breach Icon
A visual representation of the correlation between natural disasters and the subsequent spike in food prices showcasing the economic vulnerability of affected communities.. Vector illustration
Risk Management Hazard Line Editable Icons set. Vector illustration in thin line modern style of warning, danger, security, protection. Editable stroke. Vector illustration
Threat Assessment Icon
Security Icon
A cracked shield with an exclamation mark symbolizes vulnerability and protection issues.
Line style icons of cybersecurity and privacy: security update icon, patch installation badge, auto update screen, system fix timeline, vulnerability log panel, critical fix alert, version control
Data theft cybersecurity concept. Hacker stealing personal information. Online crime, privacy breach, confidential data stolen. Password security, identity theft, digital protection vector.
A woman expressing discomfort while holding her hands to her face in a minimal vector illustration showcasing emotional vulnerability and warmth in a cozy setting vector art
Elderly hands expressing vulnerability in gentle pose, human connection
Shield containing a bug, symbolizing security and protection against threats and vulnerabilities online
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
A cheerful rainbow smiles amidst menacing dark clouds, with falling nails symbolizing vulnerability and resilience.
Cybersecurity Risk Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Person icon with a shield that contains an X, representing vulnerability
Line style icons of emotions and moods: sad face in circle, tear with calm expression, cloudy mood icon, low energy symbol, quiet grief badge, soft vulnerability ring, blue feeling symbol, emotional
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Risk Icon
Bait hacking icons set. Various cyber security threats, phishing scams, and online vulnerabilities endangering user data and privacy
Security Testing Icon
A bank conducting regular vulnerability assessments and tration testing to identify and address potential system weaknesses.. Vector illustration
Kneeling stick figure in a pose of vulnerability or prayer. The simple black silhouette against a plain background evokes feelings of contemplation and introspection
Cyber security breach concept. Hacker stealing confidential information and personal data. Computer crime, malware, phishing attack, and digital privacy risk. Network security alert.
Network and data security icons highlighting system vulnerabilities
Frayed rope symbolizes tension and potential breaking point.
Line style icons of cybersecurity and privacy: penetration test icon, ethical hacking badge, vulnerability probe screen, system test layout, attack simulation panel, result findings card, test report
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Elderly hands expressing vulnerability in gentle pose, human connection
Couple with tissue box, silhouette of emotional support and vulnerability
Digital Security: Hand-drawn shields represent digital security and protection. Each element symbolizes a lock, a checkmark for confirmation, and a shield symbolizing protection.
A boy is lying asleep on a chair or bench by the sea, surrounded by the peaceful sound of waves. Above him, a robot gently watches over or protects him, creating a touching contrast between human vuln
Insider Threat Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Flat vector icons of cybersecurity analytics: network threat monitoring badge, vulnerability scanning dashboard medal, cybersecurity incident report trophy, risk assessment analysis ribbon, system
Risk Icon
Vulnerability Line Gradient Circle Background Icon
Penetration Testing Icon
A beetle on a microchip represents software bugs and computer vulnerabilities
Security Testing Icon
A broken lock with a red danger sign on top indicating the vulnerability of personal data if not properly secured.. Vector illustration
Incident Response Fill Icon Vector Illusrtation
Cybercrime concept vector with hacker stealing passwords via phishing attack. Data breach, malware, internet security threat, identity theft, and computer fraud illustration.
Penetration Testing Icon
Multiple sclerosis icons outline key concepts like damaged nerves, signal loss, and impaired navigation for MS awareness. Outline icons set
Line style icons of cybersecurity tools: antivirus software icon, network scanner, encryption key, security audit file, vulnerability scan icon, ethical hacker badge, incident response kit, keylogger
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
Flat vector icons of secure software development: DevSecOps pipeline icon, secure coding shield, vulnerability scanner badge, code review checklist, secure deployment cloud, penetration test report,
Upset young man leaning against wall, expressing vulnerability
Website Vulnerability Scanner Icon
Illustration concept of a virus-infected computer.
Security shield with heart and padlock in minimal style
Cybersecurity Risk Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Cybersecurity Risk Icon
Ocean acidification process.chemical equation and consequences
Cyber threat Icon
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Security Testing Icon
Code Review A programmer examining lines of code on two monitors with highlighted sections and warning symbols indicating their role in identifying vulnerabilities in software.
Security Colour Icon Vector Illustration
Exploit Icon
Penetration Testing Icon
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Supply Chain Risk Icon
Cyber Threat Icon
Next page
/ 10