Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Vulnerability text with decimal number background
Ethical hacker. Character conducting a security penetration test. White
A lock within a shield symbolizes security and protection. Ideal for apps or websites focused on data privacy, cybersecurity, or password management. Use for secure login or vault features.
Vulnerability glyph color icon
Vulnerability Icon
Trustworthy and honesty to believe in work together, integrity or trust for partnership, support and reliable to help success together concept, businessman acrobat hold hand tight by trusted partner.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
handicap
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Internet services icon collection set. Containing server web, features, higher support, authentication mechanisms, anonymous, basic access, digest icon. Simple flat vector.
A woman sitting on a bed hugging a pillow while wearing blue pajamas in a flat vector illustration showcasing feelings of contemplation and vulnerability
Vulnerability Icon
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Insecure Icon
AI in Cybersecurity abstract concept vector illustrations.
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Vulnerability  Icon Set Multiple Style Collection
Risk Factor Blue Black Icon
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Vulnerability  Icon Set Multiple Style Collection
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Vulnerability Icon
Black line icon for Vulnerability
A warning sign indicating a data breach, featuring an exclamation mark and bold text highlighting the term "DATA BREACH.
Deteriorating Financial Performance: Risk of Economic Decline and Instability
Encircling Care: A Single-Line Embrace of Vulnerability
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Security web icons showing 15 cybersecurity symbols. Suitable for website, app, and graphic designs related to online security measures.
Security Vulnerabilities Blue Icon
Cybersecurity and Privacy Concept: Digital Shield, Secure Data Protection, Encryption, Firewall, Privacy Protection, Technology, Online Safety, Cyber Defense
document security icon sign vector
A fractured planet's core exposed, revealing internal struggles and vulnerability amidst vibrant, striped tectonic plates.
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Shield Slash Outline Icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
Risk Factor Glyph Blue Grey Icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Security Breach Icon
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Breach Icon
ネットワークセキュリティのイメージイラスト
Cloud hacking or unauthorized access, cloud security or data breach, cloud vulnerability or cyberattack, cloud encryption or data protection, hacking attempts or cybercrime, cloud-based systems
Ocean acidification process.chemical equation and consequences
Bug fixing doodle for improve website performance
blonde woman delicately covers her eyes conveying a sense of vulnerability against a muted cityscape backdrop.
A senior citizen receives a COVID-19 vaccination, highlighting healthcare workers' dedication and the elderly's vulnerability to the virus.
Risk Assessment Icon
Security Vulnerabilities Flat Icon
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Vulnerability Icon
Shield Slash Solid Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
A shadowy figure, digitally manipulated, symbolizes the hidden perpetrator of cyberbullying, highlighted by a single spotlight.  Illustrate the vulnerability of the victim.
Man wielding sledgehammer near shopping bags and wireless icon. Ideal for digital disruption, online security, data breaches, e-commerce challenges, hacking, modern retail, cyber vulnerability
Penetration Testing icon vector image. Can be used for Business Audit.
unprotected
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Vulnerability Icon
Risk management line outline icon
Software bug or coding errors, system malfunction or software crash, performance issues or application slowdown, data corruption or file errors, security vulnerability or exploit, coding mistake or lo
Webpage error notification concept, data vulnerability and risk
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Computer Problem User Composition
Unsafe Icon
System Vulnerability Icon
Security Vulnerabilities Outline Icon
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
IT risk glyph icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
A Sad Capybara: A cartoon illustration captures a capybara in a moment of sorrow, shedding tears and conveying a sense of vulnerability and empathy.
A woman trapped within a complex, chaotic web of tangled threads symbolizing deceit and lies.  Her expression conveys vulnerability and despair.
Root Cause Icon Element For Design
Vulnerability Vector Design
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Vulnerability Icon
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
vulnerability cyber security system illustration lock symbol circuit broken
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Bug fixing - patch updates for improve performance
Risk management mind map flowchart business concept for presentations and reports
Unsafe Icon
Zero-Day Exploit icon line vector illustration
Security Vulnerabilities Outline Color Icon
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Laptop icon infected by malware with long shadow on white backgr
Programmer at work. Computer assisted design, developer testing program.
Supply Chain Risk Icon
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Next page
/ 10