Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Security Patch icon
Breach Icon
Insecure Icon
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Broken shield icon Simple thin outline
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
security assurance icon sign vector
Honeypot Icon
Cybersecurity consulting service gradient header information consultant professional solution for company information technology cyber security
Encircling Care: A Single-Line Embrace of Vulnerability
silhouette of a girl and  domestic violence
Risk Flat Icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
User Interface Security Icons Privacy, Protection, and Access Control
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Exploit Icon
Cyber Threat Icon
computer protection icon sign vector
Vulnerability Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Zero Day Icon
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Threat Icon
data and document protection
Hacking glyph icon
Security Breach
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
risk
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Site threat Icon
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple line vector illustration.
Penetration Testing Icon
A hand delicately pierces a balloon labeled ego, symbolizing the fragility of self-importance in a serene and minimalistic setting that evokes thought and reflection
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Supply Chain Risk Icon
Bug Icon
Vulnerability Icon
Geometric Trojan horse on wheels beside a web window with user icons under a cloud. Ideal for cybersecurity, data breaches, hacking, cloud risks, malware, internet safety, abstract line flat metaphor
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Exploit Icon
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple glyph vector
Cyber Risks Icon Style
Risk Factors Icon
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
warning on browser icon sign vector
security antivirus check mark icon sign vector
Risk
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Security Breach Icon
Security Testing Icon
Insecure Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
System Vulnerability Icon
Hacking glyph icon
Vulnerability Icon
Cyber threat Icon
Security Icon
Zero Day Icon
Ethical hacking involves protection, security, and trust. Key objects, shield, lock, handshake. Outline icons set.
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Security Risks Icon Style
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Cyber Attack Line Icon Sheet
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Magnifying glass is being used to closely examine a computer bug, highlighting the concept of identifying and resolving software vulnerabilities
risk
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Failure Mode Outline Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Insecure Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Security warning shield indicating a potential threat or vulnerability
Penetration Testing Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Risk Icon
Honeypot Icon
Exploit Icon
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Open Source Icon
Patch software. Operating system updates that address security vulnerabilities
Next page
/ 10