Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
risk multiple style collection
Cybersecurity Specialist Investigating Data Protection With AI Powered Security Network
Damaged old iron fence showing security problem
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
Code inspection - uncovers errors in programming scripts through red magnifying lens and warning alert triangle. Debugging for software developers in quality assurance workflows. Vector illustration
Social vulnerability icon set, diverse population symbols, support group graphics, healthcare and policy visuals, inclusion and equity design elements
Flashing Red Emergency Siren with Yellow Light Rays.
Broken shields show vulnerability and represent failure,Broken shield icons in bold and outlined styles.Broken Shield icon - vector. Security Shield icon in flat style. Symbols of broken protection.
Vulnerability  White Icon Set Design
Weak link. Broken chain or weakness concept. Broken or unleashed black chain like freedom icon. concept of lost control sign or system vulnerability or security risk. Vector illustration
Leadership Vulnerability Icons. Leadership vulnerability. Line icon set of leadership vulnerability: heart, shield, open hand, human head, speech bubble,
Threat Detection icon sheet multi style collection
Set of mitigation Icons or symbols Vector fully editable file.
A programmer or IT specialist analyzes a database, finding a critical error, threat, or system vulnerability with a magnifying glass
Three hooded hackers working together on laptops in the dark
Secure Cloud Computing Data Protection with Shielded Servers and Network Security
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Cybersecurity line icon set. vector pictograms of protection, shield, virus, phishing, and vulnerability, thin outline illustration.
Illustration of a single clear and pristine teardrop, conveying purity and symbolizing freshness or emotional vulnerability against a white backdrop
Risk icon sheet multiple style collection
risk Two-tone version in black and white background
Risk Analysis Icon Banner
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
Cybersecurity, threat detection, software vulnerability, malware analysis, digital safety, bug tracking. A magnifying glass focusing on a bug beside an alert triangle. Cybersecurity and threat
Network Security Icons. Outline style icon of Network Security Assessment Suite: vulnerability scanner, port scan radar, CVE
Malware infection on document causing software security vulnerability concerns
Threat detection vulnerability scan security risk assessment icon vector eps silhouette
Cyber risk assessment icon illustrating vulnerability analysis and security posture management.
Cyber security icon set. Digital protection measures, computer virus, malware threat, data privacy, phishing email, password access. Vector flat cartoon illustration symbols.
Vulnerability. Outlined stroke vector icon with black-filled details.
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Website security vulnerability illustration showing software bug detection
3D Risk Infrastructure Icons. Infrastructure Risk Management flat isometric set: hazard-assess node, vulnerability-metric tile, resilience-plan bead.
Abstract cyber security hackers with laptops and data flowing
Cybersecurity concept with people working on data security and privacy protection
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Broken metal fence barrier creating gap
Cybersecurity shield with lock and circuitry
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Abstract illustration of three hooded figures in dark blue tones
vector banner of cyber resilience framework in creative flat design suitable for web banners business presentations online articles cybersecurity awareness materials digital transformation visuals
Cybersecurity shield, digital protection, circuit board, data security concept.
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Risk Icon
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Broken hacked Wi-Fi router with cracked screen and scattered objects around it illustrating cybersecurity failure and technology vulnerability
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Broken chain link vector illustration set representing disconnection and vulnerability
A minimal set of 24 solid glyph icons representing cybersecurity, data privacy, and network protection concepts for technology
Four open padlocks showing different styles of broken security
Cybersecurity concept with a hooded hacker typing on a keyboard, surrounded by glowing digital screens displaying code and a prominent padlock icon, symbolizing internet crime and data protection in
Crisis Emblem Logo Variations. Facing a personal crisis with vul
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Hand-drawn black and white sandcastle is about to be destroyed by a giant crashing ocean wave in a dramatic sketch style illustration showing impermanence and vulnerability
Abstract Hacker Hooded Mask logo
Emblematic Crisis Logos. Facing a personal crisis with vulnerabi
Target on a person's head, symbolizing threat or danger
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
A broken metal chain link vector illustration with a textured black and white design. It highlights vulnerability and strength through its fragmented background.
Open Security Shield: A graphic representation of an open padlock on a shield, symbolizing security and protection, suggesting vulnerability or unlocked status, a digital safeguard concept.
A vibrant red heart rests upon a fractured surface, symbolizing heartbreak, emotional damage, or vulnerability in relationships.
Vulnerability Logo Variations. Facing a personal crisis with vul
Understanding the Continuous Cycle of Effective Risk Management Processes From Identification to Monitoring
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Broken padlock icon in flat blue style on white background
Safeguard your data with robust cybersecurity solutions, ensuring comprehensive protection against online threats and vulnerabilities in a digital age of evolving risks
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
A collection of hacker-themed outline icons, showcasing technology and cybersecurity elements.
Global supply chain disruptions impacting business operations and financial stability worldwide
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Businessman shielding from rain near falling dominoes representing risk and protection
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Risk Assessment Icon
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Faded hope a sunflower seeking light from an artificial lamp, depicting nature's vulnerability
Cybersecurity vulnerability scan vector finding weak point in system
Cyber security and network defense line icon set. Vector pictograms of firewall, encryption, phishing, and vulnerability analysis, thin linear illustration.
Vulnerability icon with white background vector stock illustration
Secure data storage concept with blocks and padlock illustration.
Shattered realities: A fractured hand gesture on dark canvas expressing vulnerability
Large set of outline vector icons for cyber security, data protection, digital safety, insurance, and system vulnerability symbols.
Next page
/ 10