Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Computer Security Bug Icon
hacker logo. vector. editable.
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Understanding and preventing computer viruses and malware threats to digital security
Urban disaster aftermath featuring a partially collapsed house with broken roof beams and fallen bricks gathered into a tight visual metaphor of vulnerability
3d shield under magnifying glass with red cross mark inside. Security failure detection, vulnerability identification, risk exposure analysis, threat diagnostics concept.
Trust and vulnerability in love. A calm editorial scene of two people standing close, gently sharing a quiet moment, with subtle heart and
Cybersecurity Evaluation Process. Cyber vulnerability assessment. Professional reviewing system components with checklists and alert icons, careful and
Collection of data breach, security alert and cyber attack notification icons set
Vulnerability  Icon Set Multiple Style Collection
Hardening Icon
Incident Multistyle Icon Set
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Cybersecurity and digital threat protection icons for vulnerability check, mobile security, and virus protection on devices
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
 risk
脆弱性を表すシールド
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Cybersecurity intelligence line icons collection. Threats, Breaches, Hacks, Malware, Vulnerabilities, Pentesting, Encryption vector and linear illustration. Firewalls,Intrusion,Phishing outline signs
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Trust and vulnerability in love. A calm editorial scene of two people standing close, gently sharing a quiet moment, with subtle heart and
Social volunteering or social care concept. With three illustrations of social workers helping elderly and disabled people. Flat vector illustration
Risk
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Decryption Icon
Vulnerability Multistyle Icon Set
Protección de las personas mayores o tercera edad.
Supply Chain Risk Icon
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Vulnerability icon set featuring zero day,exploit and data breach.Ideal for cybersecurity analysis and threat detection concepts.
Understanding the threat of malicious software and its impact on digital security
Digital shield with a padlock representing cybersecurity and data protection
Sql Injection
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Illustration of a single clear and pristine teardrop, conveying purity and symbolizing freshness or emotional vulnerability against a white backdrop
Cyber Security Threat to Online Banking and Financial Transactions. Vector Illustrations. EPS Editable
Silhouette of a woman curled up in a ball on a white background.
Vulnerability  Icon Set Multiple Style Collection
Risk Blue And White Icon Style Collection
Vulnerability Check icon set multiple style collection
Dramatic silhouette of falling man in distress, vector illustration for anxiety concepts, accident prevention campaigns, and crisis management visuals
Abstract grunge art with dramatic brushstrokes and distressed textures and dark moody backdrop and artistic imperfection and creative design inspiration and unique visual impact.
Silhouettes of people falling in various situations like slipping, tripping, falling down stairs, and off ladders
Network Security Icon
Cybersecurity, financial crime, hacking, online scams, digital threats, human vulnerability. A hacker connected to computers, a money bag and a heart. Cybersecurity and financial crime concept
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Business IT Security Concept Design, Mesh of Connected Network Client Nodes
Supply Chain Risk Icon
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Virus detection icon set with scan,quarantine,sandbox and system update concepts.Ideal for antivirus software,malware analysis and cybersecurity monitoring systems.
system vulnerability symbols seamless pattern, repeating pattern, surface design, textile print, soft color palette, modern illustration, no shadows, flat
Stylized Depiction of Woman Facing Emotional and Mental Challenges Illustration
A collection of cybersecurity icons depicting data protection privacy and network security measures high quality professional
Secure Cloud Computing - Shielding Data with Digital Protection.
Security Breach Icon Set Vector Collection Isolated In Black And White
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
Curled Anxiety Figure: Symbolizing Fear, Panic, and VulnerabilityCurled Anxiety Figure: Symbolizing Fear, Panic, and Vulnerability
Cyber Security Icons Set Shield Protection Data Network.
Root Cause Icon Element For Design
악성 이메일이 여러 사용자에게 전파되는 사이버 공격의 개념적 표현
Digital lock protect data flow in global network
Black and white line icons of security shield and document warning signs for cybersecurity concept isolated on white background
Cloud Computing Security Shield - Protecting Data with Digital Encryption.
Cloud Security Shield Icon for Data Protection and Privacy.
Secure Coding Icon
Conceptual Cybersecurity - Shields, Arrows, and Circular Arrows Depicting Protection.
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Penetration Testing Icon
Abstract symbols flat design long shadow glyph icons set
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
Vulnerability Scan Icon White And Black Background Style
Broken padlocks illustrating security breach or failure
Black and white icon of a database server losing data protection from a cracked security shield
Risk  Icon Set Different Style Collection
Cyber security threats on smartphone. System vulnerability warning. Mobile phone hacking. Cybercrime or antivirus concept. virus, malware, ransomware, or bug. Flat cartoon icon. Vector illustration.
Protecting digital assets with a strong security shield and data protection icons representing cybersecurity and online safety
Cybersecurity line icon set. Vector pictograms of monitor lock, email alert, shield, hacker, server, cloud, password, fingerprint, firewall, VPN, USB drive, warning, thin linear illustration.
Broken Chain Links Strength and Weakness, Connection and Disconnection
Set of Risk icon in black and white collection
Vector art featuring a cybersecurity design depicts a character protecting data on a laptop from a cyberattack, set against a clean white background with a businesslike and secure mood
Broken stick or rod with crack in the middle
Cybersecurity threats and solutions presented as secure and vulnerable devices icons
Digital Cloud Security Shield Protecting Data and Information.
傷ついた盾のシンプルなイラスト
Exploit Icon
Shield security protected icon, unprotected vulnerability cross red safety guard sign symbol drawn doodle cartoon illustration set, rejected red and approved green safeguard guarantee clip art logo
a silhouette of a person in a gas mask disintegrating into fragmented particles illustrating environmental crisis and human vulnerability
Cybersecurity defense icons including red team simulator automated penetration testing broken chain link security penetration simulator protection vulnerability cybersecurity mitigation
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Security Monitoring web banner icon vector illustration with icons of Zero Day,Vulnerability,Threat,Cyber Security,Data Breach,Ghost and Sandbox
This illustration conveys the vulnerability of individuals to viruses and disease. It's ideal for health-related content, awareness campaigns, or arti
Cybersecurity icons for vulnerability prioritization attack surface mapping exploit mitigation with protection strategy cyber threat risk management security assessment data security network secu
Against a cityscape silhouette, a damaged power line is spotlighted, contrasting a flashlight with a candle, creating a symbolic illustration of energy infrastructure vulnerability
Next page
/ 10