Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
This outline icon illustrates a state of damage or breakage, emphasizing repair, destruction, or fault within a comprehensive pictogram series.
Cybersecurity, digital threats, malware, hacking, online security, data protection. Binary code, Trojan horse and eye symbol with gears. Cybersecurity and digital threats illustration
A graphic illustration of low, medium, and high risk gauges on a white background
Cybersecurity Shield Network Protection.
Simple black line drawing of an unlocked padlock on white background.
Three padlocks in different states of security
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Cybersecurity Evaluation Process. Cyber vulnerability assessment. Professional reviewing system components with checklists and alert icons, careful and
Collection of security icons including locks and shields.
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Frayed rope symbolizes tension and potential breaking point.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Security icons for digital protection.
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Illustration of a single clear and pristine teardrop, conveying purity and symbolizing freshness or emotional vulnerability against a white backdrop
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
A collection of black and white icons representing security and technology concepts
alien Vintage Contemplative Human Figure Engraving, Inverted Black White Xerography Vector for Laser Engraving on Dark Background
Green and Red Unlocked Padlock Icons Isolated
Ethical hacking and cybersecurity icon set for security, featuring hacker, data protection, and network threat symbols for digital defense, white hat operations, and vulnerability assessment.
Cybersecurity breaches, malware, coding, software vulnerabilities, hacking prevention, online protection. Developer writing code, bug and Trojan horse symbols. Cybersecurity and malware ion
Soldier with first aid kit helping crowd near submarine
Outline neon pc malware icon set. Glowing neon system unit and monitor screen frame with bug sign, cyber security hack pictogram. Error debug, software bugs, hacker and virus attack.
Computer Problem User Composition
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
脆弱性を表すシールド
Cybersecurity line icon set. Vector pictograms of monitor lock, email alert, shield, hacker, server, cloud, password, fingerprint, firewall, VPN, USB drive, warning, thin linear illustration.
System administrator online service or platform. Technical work with server
악성 이메일이 여러 사용자에게 전파되는 사이버 공격의 개념적 표현
Software quality assurance, cybersecurity firewall, system, software icon
Abstract technology security  global network background, vector
Cyber Security Icons Set Shield Protection Data Network.
Cybersecurity concept warning on hacker laptop
Security warning icons alert shield danger protection symbols set
Black silhouette of a fetus within a radiating circle with text
Silhouetted Man Laying Flat, Arms Open, Reaching Upwards, Dreamy Isolation.
Computer Security Bug Icon
Penetration Icon In Black And White Outline Style
Cybersecurity, malware protection, online threat detection, internet safety, software vulnerabilities, hacker prevention. Address bar with bug symbol and upward arrow. Cybersecurity and malware
Shield of protection intertwined with a heart symbolizing security and care.
Understanding and preventing computer viruses and malware threats to digital security
Fractured Integrity: The symbolic image of a bar is fractured, representing the breakdown of structure, breaking point, and concept of disruption.
Risk management mind map flowchart business concept for presentations and reports
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
et of modern magnifying glass with shield and arrow icons in black, white and blue, representing security and protection concepts for business and technology use
Protection background. Technology security, encode and decrypt, techno scheme
Mobile Security icon set. Antivirus, Vishing, Phishing, Mobile Computing, Vulnerability, Phone Settings, Online Privacy, Face Recognition. Duotone color solid and editable outline icons
Risk Blue And White Icon Style Collection
Security and compliance icon set: audit, encryption, data privacy, firewall, risk management
Broken shield icon Simple thin outline
Broken Circle Icon Representing Disruption and Imperfection.
Abstract technological padlock illustration, intricately designed with circuit board patterns, symbolizing robust digital data protection, cybersecurity, and secure network infrastructure
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
A collection of modern technology and security icons on a white background
A hacker exploiting vulnerabilities in interconnected digital systems and devices Vector, illustration
Security shield icon featuring an open padlock. Symbol for unprotected data, system vulnerability, open access, or deactivated firewall protection.
Set line broken or cracked lock icon isolated on white background, unlock sign, colorful vector icons set representing security breach
Breach Detection icon set multiple style collection
Secure data network connection protection and cyber security concept
Risk Single Icon Pack Multistyle
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Cracked egg icon, broken shell and fragile object symbol vector design
Cybersecurity and Data Protection Icons Set.
Digital security with grunge texture, ascending bar graph, data protection symbol, cyber lock, ransomware visual, tech security graphic.
Print
Terrified woman is surrounded by frightening ghosts and shadowy hands as a representation of anxiety, fear, and mental health struggles.
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Cybersecurity icons illustrating network protection and threat management
Hacker in a dark hoodie types on a laptop, side view.
Open backdoor in a black wall cybersecurity concept illustration
Broken padlocks illustrating security breach or failure
Flat colored artificial intelligence themed icon illustration
Broken chain link graphic with burst effect striking black silhouette
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
A dramatic lightning storm over a mountain range with a small house in the foreground
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple line vector.
 risk
A detailed line drawing depicts a world globe cradled within two protective open hands symbolizing care and global responsibility high quality professional modern elegant
Adobe Illustrator Artwork
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Hands cradling earth a symbol of global protection and environmental care
Risk  Icon Set Different Style Collection
hacker icon set multi style various collection
Secure voting system with ballot box, padlock, shield, and molecular structure on light blue background, representing safe and protected
Cybersecurity intelligence line icons collection. Threats, Breaches, Hacks, Malware, Vulnerabilities, Pentesting, Encryption vector and linear illustration. Firewalls,Intrusion,Phishing outline signs
Broken eggshell cracked open with visible cracks and lines
Cybersecurity icons: threats, alerts, and protective measures
Vulnerability Multistyle Icon Set
Risk
Supply Chain Risk Icon
Flat colored artificial intelligence themed icon illustration
Social volunteering or social care concept. With three illustrations of social workers helping elderly and disabled people. Flat vector illustration
Protección de las personas mayores o tercera edad.
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Next page
/ 10