Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Threat detection vulnerability scan security risk assessment icon vector eps silhouette
Cybersecurity line icon set. vector pictograms of protection, shield, virus, phishing, and vulnerability, thin outline illustration.
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Vulnerability Icon Collection Set Multiple Style
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Flashing Red Emergency Siren with Yellow Light Rays.
Three hooded hackers working together on laptops in the dark
Broken shields show vulnerability and represent failure,Broken shield icons in bold and outlined styles.Broken Shield icon - vector. Security Shield icon in flat style. Symbols of broken protection.
Risk icon sheet multiple style collection
Abstract illustration of three hooded figures in dark blue tones
Threat Detection icon sheet multi style collection
Website security vulnerability illustration showing software bug detection
Digital Guardian of the Web An Abstract Illustration Symbolizing Cybersecurity, Anonymous Protection, and the Enigmatic World of Online Data Networks
Illustration of a person in a hoodie and mask typing on a keyboard in front of computer screens
Digital Scam Warning on Mobile Phone Screen Vector - Cyber Security Alert Interface with Red Neon Glow Technology
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Leadership Vulnerability Icons. Leadership vulnerability. Line icon set of leadership vulnerability: heart, shield, open hand, human head, speech bubble,
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
Cybersecurity shield with lock and circuitry
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Virus Icon Set Multiple Style Collection
Social vulnerability icon set, diverse population symbols, support group graphics, healthcare and policy visuals, inclusion and equity design elements
Supply chain disruption management risk strategy vulnerability
Broken chain link vector illustration set representing disconnection and vulnerability
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Risk Icon
Cyber Risk Exposure Icon Set containing cyber hygiene, data sensitivity, threat landscape, regulation, vulnerabilities and third-party risk vector icons
Cybersecurity control room with analysts monitoring data on computers and security themed wall art
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Cybersecurity threat icon set depicting a computer bug with an integrated circuit, representing malware, virus, software error, or system vulnerability
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Hacker with laptop vector icon anonymous person in hoodie concept for cyber security and data theft
Hand-drawn black and white sandcastle is about to be destroyed by a giant crashing ocean wave in a dramatic sketch style illustration showing impermanence and vulnerability
Large set of outline vector icons for cyber security, data protection, digital safety, insurance, and system vulnerability symbols.
Hacker in Black Hoodie and Mask Working on Computer.
Malware infection on document causing software security vulnerability concerns
Illustration portraying expressive eyes with tears conveying deep sadness and vulnerability
Threat vector icon
Cybersecurity line icon set. Vector pictograms of mobile protection, user access, server, hacker, malware, data storage, and biometrics, thin linear illustration.
Cyber security and network defense line icon set. Vector pictograms of firewall, encryption, phishing, and vulnerability analysis, thin linear illustration.
Training  Icon Element For Design
Eye with Lock and Key - Online Surveillance Awareness and Privacy Caution.
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Collection of ten cracked shield icons in a vector cartoon illustration style, presented on a black background, representing concepts of broken security, vulnerability, and failed protection, ideal
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Vivid and dynamic cracked shield thin line icon, perfect for web, books, cards, and apps. This cartoon illustration features a stylized shield with a prominent crack, symbolizing vulnerability
“The forest listens to their breath.”
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
vulnerability icon set multi style various collection
Safeguard your data with robust cybersecurity solutions, ensuring comprehensive protection against online threats and vulnerabilities in a digital age of evolving risks
Risk Assessment Icons. Line style icons of risk assessment tools: risk matrix chart, likelihood vs impact icon, vulnerability
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Security assessment icon set multiple style collection
Global supply chain disruptions impacting business operations and financial stability worldwide
Risk Icon Line and Black Fill Style Collection
Silhouette of a person curled up in a fetal position
Threat vector icon
Cracked shield symbolizing security threats and cyber vulnerabilities
Cybersecurity vulnerability concept with unlocked padlock and lightning bolt, highlighting potential security breaches and the importance of data protection
Training  Icon Element For Design
Risk Assessment Icon
Delete your data with this vector trash can, a concept for data privacy and personal data security after a data breach in a vector graphic
Emotional Icon Array. Emotional Expression Collection linear icon set: joy burst, sorrow drop, compassion flame, gratitude beam, vulnerability symbol, calm breeze, open gesture
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Secure data storage concept with blocks and padlock illustration.
Ballot box icon, with cracks symbolizing security threats.
Black bug icon beside dollar coin, signifying financial loss from cybersecurity threats. Ideal for malware risk, cybercrime, software vulnerability, data breach, fraud, hacking, simple flat metaphor
Weaknesses icon set in line and glyph style on black and white background
Abstract cyber security hackers with laptops and data flowing
vector banner of cyber resilience framework in creative flat design suitable for web banners business presentations online articles cybersecurity awareness materials digital transformation visuals
Classic car under lightning storm isolated on white background, representing danger, power, and the vulnerability of vehicles to weather
Shattered realities: A fractured hand gesture on dark canvas expressing vulnerability
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Collection of security icons, representing safety measures, access control, and protection against threats and vulnerabilities
Set of five cracked shield icons in a line, drawn with thin black lines on a white background, representing broken security, vulnerability, and failure. Simple vector cartoon illustration.
Fake W White Icon Set Design
broken padlock symbolizing a data breach, vector illustration for cybersecurity threat, information leak, and digital vulnerability
Set of seven linear vector shield icons with cracks, symbolizing broken security, vulnerability, or failure. These simple, clean line art illustrations on a white background are perfect for
Vulnerability. Outlined stroke vector icon with black-filled details.
Collection of broken shield outline icons, representing concepts of security breach, vulnerability, and protection failure. Minimalistic linear pictograms suitable for web design, graphic design, app
Illustration of two people, one holding a key and the other a tablet, near a secure vault.
Collection of fifteen cracked shield icons, hand-drawn in a white line art style on a black background, representing broken security, vulnerability, and damage, perfect for digital and print design
Set of five cracked shield outline symbols, representing broken security, vulnerability, or failed protection. These versatile vector graphics are ideal for use in designs, books, advertisements, and
Next page
/ 10