Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Threat Icon
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Minimal black silhouette of person standing on cliff edge with outstretched arms, dramatic white background, symbolizing freedom, triumph, contemplation, or vulnerability in bold illustration
Security analysis or risk assessment, vulnerability scanning or penetration testing, threat detection or risk identification, cybersecurity audit or security review, system monitoring or security log
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
Businessman shaking hands with a hacker through a laptop screen, illustrating cybercrime risks, online scams, phishing dangers, malware threats, and digital security vulnerabilities concept.
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Simple set of vulnerability related filled icons.
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Cyber threat Icon
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
breach cyber security system concept illustration
Certified Ethical Hacker - CEH - icon set & web header banner
Laptop vulnerability concept illustration of malware and cyber attack
Line style icons of smart contracts: smart contract audit checklist, security analysis icon, critical vulnerability detector, contract code review, manual audit badge, smart contract scanner tool,
Risk Icon
vulnerability search icon. Vector illustration
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
Virus on laptop, malware or network vulnerability vector
Abstract technology security on global network background, vector illustration
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Threat Icon
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
Risk Icon
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
cybersecurity data protection icon sign vector
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Outline Hacker Attack. Isometric Cyber Security Concept.
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Isometric flat vector icons of Cyber Defense Systems: honeypot decoy server, digital breach simulator, perimeter security layer, vulnerability scanner tool, security event log viewer, breach
A woman wearing a distressed expression visibly displays emotional pain, showcasing her deep vulnerability and turmoil
Antivirus software searching for viruses, malwares and vulnerabilities.
Computer screen with skull symbol warning security vulnerability alert
Abstract technology security on global network background, vector illustration
Data Leak Icon
Vulnerability search. SEO optimization,web analytics, programmin
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Risk Assessment Icon
Abstract technology security on global network background, vector illustration
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
Risk Icon
Cybersecurity vulnerability black glyph icon. System weakness and flaw. Cybercriminal gains access. Errors exploitation. Silhouette symbol on white space. Vector isolated illustration
thin line assess icon like review audit risk
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Cars and Floods – Vector graphic of flooded city cars, highlighting environmental risks, storm effects, and transportation vulnerability due to rising water levels.
Virus Infected icon in vector. Logotype
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Tense national security briefing; senior officials analyze critical digital warfare vulnerabilities & countermeasures.
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Network vulnerability highlighted by bug icon and computer screens
warning on browser icon sign vector
spectre & meltdown processor bugs - cyber security vulnerability
vulnerability search icon. Vector illustration
spectre and meltdown email spyware virus attack vulnerability vector illustration
Flat line art vector illustration of a developer coding on a laptop next to an open padlock code symbol representing open source security vulnerability and cybersecurity access.
A distressed bunny rabbit, sporting bandages, with a hidden knife subtly positioned behind its back.  Depict a sense of vulnerability and hidden danger.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Vulnerability Icon
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Risk Icon
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Root Cause Icon Element For Design
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
傷ついた盾のシンプルなイラスト
Unlocked lock illustration representing vulnerability and security in a colorful design
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
System administrator online service or platform set. Technical work with server
Bug on computer screen, software vulnerability graphic illustration
Open backdoor in a black wall cybersecurity concept illustration
Risk Assessment Icon Element For Design
Symbolic representation of vulnerability and growth in a minimalist design
Website audit or digital compliance check, performance analysis or speed testing, security scan or vulnerability assessment, user experience or interface evaluation, mobile responsiveness
Vector illustration of a coder on an open padlock with code tags, symbolizing open-source software security, programming vulnerabilities, and technology access control concept.
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Broken padlock on a laptop screen representing data vulnerability and hacking
Emotional Vulnerability Icon
Security Breach Icon
Trustworthy and honesty to believe in work together, integrity or trust for partnership, support and reliable to help success together concept, businessman acrobat hold hand tight by trusted partner.
Abstract technology security on global network background, vector illustration
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
malware flat gradient icon
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Penetration Testing Icon
Security Breach Icon
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Vulnerability Scanner Icon
Cybersecurity vulnerability illustration with shield and bug inside window
Ethical Hacking Icon
Vector outline broken padlock icon representing security risks and vulnerabilities
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Next page
/ 10