Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
Insider Threat Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Threat Icon
Risk Icon
Exploit Icon
Breach Icon
warning on browser icon sign vector
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Threat Icon
Zero Day Blue Icon
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Vulnerability Icon
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Risk Factor Outline Icon
Security Breach
Hacking concept
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
Insecure Icon
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Cybersecurity Risk Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Threat Icon
Penetration Testing Icon
Exploit Icon
Decryption Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Encircling Care: A Single-Line Embrace of Vulnerability
personal information fraud icon sign vector
Failure Mode Flat Icon
Self-Esteem Icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
This vibrant illustration features various elements depicting disproportionate ransomware threats, Customizable illustration of disproportionate ransomware.
Risk
A woman standing in fear beneath two large hands in a flat, minimal design style vector illustration depicting vulnerability and tension in an abstract environment
System Vulnerability Icon
Vulnerability Icon
Secure padlock icon within a shield, symbolizing data protection and online safety.  A simple yet powerful graphic for security-related projects.
vulnerability glyph style icon
Insecure Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Insider Threat Icon
Threat Icon
Cyber threat Icon
Exploit Icon
Vulnerability Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Flat isometric illustration concept.  security network
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
Zero Day Glyph Icon
Visual representation of software vulnerability detection icon illustration
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Criminal Assault Threat Icon
Vulnerability Icon
Set of 8 "weakness" icons, 1 unexpanded, 1 silhouette - Weakness icon representing fatigue low energy or vulnerability ideal for health n wellness applications
data and document protection
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
virus in mail icon sign vector
Ethical hacker abstract concept vector illustration.
Misconfiguration Icon Lineal Syle
Insider Threat Icon
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Cyber threat Icon
Exploit Icon
Threat Icon
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Failure Mode Blue Icon
broken padlock glyph icon
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
One Line Journey to Authenticity: Unmasking the True Self
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Laughter and tears mingle together as the poets share their work their vulnerability and strength shining through with each verse.. Vector illustration
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Social Inequality Line Banner Web Icon Set Vector Illustration, Inequity Exclusion Wealth Prejudice Social Class Hierarchy Fragmentation Education Level
Cybersecurity Risk Icon
Exposure Icon
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
Exploit Icon
Risk Icon
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Computer security specialist online service or platform. Idea of digital
Failure Mode Glyph Icon
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Simple set of vulnerability related filled icons.
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
vulnerability search icon. Vector illustration
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
breach cyber security system concept illustration
Next page
/ 10