Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Exploit Outline Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Hacking glyph icon
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
System Vulnerability Icon
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
security assurance icon sign vector
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Penetration Testing Icon
User Interface Security Icons Privacy, Protection, and Access Control
silhouette of a girl and  domestic violence
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
Cyber Attack Line Icon Sheet
Failure Mode Blue Icon
Security warning shield indicating a potential threat or vulnerability
A shield with a spine and cracks symbolizes vulnerability and fragility.
Threat Assessment Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
AI in Cybersecurity abstract concept vector illustrations.
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Encircling Care: A Single-Line Embrace of Vulnerability
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Cyber Threat Icon
Minimalist Trojan Horse Icon, Blue and Green Tones, Cybersecurity Concept
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
A hand delicately pierces a balloon labeled ego, symbolizing the fragility of self-importance in a serene and minimalistic setting that evokes thought and reflection
data and document protection
Security Patch icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
security antivirus check mark icon sign vector
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple line vector illustration.
warning on browser icon sign vector
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Security Testing vector icon illustration of Quality Assurance iconset.
Vulnerability Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Neon half tone shield representing vulnerability in digital world with glowing lines
Security Breach
Broken shield icon Simple thin outline
Risk Assessment Icon
Penetration Testing Icon
Hacking glyph icon
Exploit Icon
Security Breach Icon
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Security scan flat line icon set. Security scan Thin line illustration vector
Failure Vector  Or Logo Sign Symbol Illustration
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
computer protection icon sign vector
Exploit Icon
51 Attack Flat Icon
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Security Testing vector icon illustration of Quality Assurance iconset.
Vulnerability Icon
Flat illustration of data security expert inspecting security logs with alert notifications popping up
1049 - Risk Concept Illustration
risk
broken padlock glyph icon
Penetration Testing Icon
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Risk Icon
Zero Day Icon
Open Source Icon
Vulnerability Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Franchise Risk Flat Icon
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Security Testing vector icon illustration of Quality Assurance iconset.
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Sicherheitslücke finden
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Next page
/ 10