Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
A silhouette of a man carrying a woman in his arms against a white background
Terrified person hiding under blue blankets in bed at night
Emotional risks friendship conflict concept where a person hesitates to speak to a friend while tiny sparkle and star icons highlight vulnerability, honesty,
Cybersecurity icons: password cracker, network scanner, ddos, malware, firewall bypass
Person peeking from behind a sad theatrical mask
Illustration of interconnected devices and networks in a cybersecurity context
Risk Blue And White Icon Style Collection
Conceptual illustration of database security, data protection, and server architecture.
Three anime-style vector illustrations of a blindfolded woman in a black swimsuit and yellow raincoat, kneeling with head bowed, on a blue background, depicting vulnerability or contemplation.
Computer software debugging concept showing magnifying glass inspecting website on laptop to find and fix security vulnerabilities.
Inner emotional crack depicted by a seated figure with subtle fissures in the silhouette, tiny floating shards and stars suggesting vulnerability, reflection,
Brain Security and Data Protection Icons - Cybersecurity Concepts
Hacker with laptop in dark digital scene. Cybercrime, data breach, online attack, network threat, privacy risk, cybersecurity alert, future technology concept. Vector illustration
Sharp thorns symbolize pain, struggle, and sacrifice against a clean background
Isometric Illustration of Software Testing and Debugging Process.
Cybersecurity, hacking threats, data breaches, cloud computing, online security, digital risks. Geometric Trojan horse with cloud and data arrows. Cybersecurity and hacking threats concept
Illustrative comparison of online security and data privacy for protected users versus tracking and vulnerability for digital information
Conceptual illustration showing cloud security vulnerabilities with a knife pointing towards a tent inside a cloud icon.
Cybersecurity training session in a modern office setting with employees learning about data protection and network security protocols
Cybersecurity measures to protect against various digital threats and vulnerabilities Vector
Contrast of protection and vulnerability depicted by hands holding shields
Hacker, code, lock, warning, and network symbols highlight cybersecurity threats
Man running with keyboard and shield representing cybersecurity.
A car's windshield is damaged by falling hailstones
Emotional risks romantic confession concept where a person nervously expresses feelings while tiny sparkle and star icons highlight vulnerability, courage, and
Stylized computer bug icon representing a software vulnerability or cybersecurity threat
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
A broken piggy bank with coins spilling out on a white background
Risk Icon
Conceptual Illustration of Security and Protection Symbols for Privacy.
Cartoon stick figure looking scared and overwhelmed by many hands pointing fingers of blame and accusation from all directions.
Stylized depiction of people huddling in fear and distress beneath a looming tornado, symbolizing vulnerability and the overwhelming power of natural disasters
vulnerability icon
Broken chain link representing weakness and vulnerability in a simple line art drawing
Cracked Shield Icons Set with Lightning for Security Breach, Damage, and Vulnerability Symbols
Cybersecurity, DDoS attacks, network vulnerability, internet threats, wireless communication, online safety. wireless symbol, person analyzing data rockets labeled DDoS. Cybersecurity and DDoS
Cyber Security Icons Set: Data Protection, Hacking, Network Threat, Malware, Lock, Search Stock Media
Illustration of Cybersecurity Professionals Working on Data Protection.
Intricate Network of Digital Security and Data Protection Concepts.
Student struggles with peer pressure and social anxiety, isolated by haunting shadows of bullying in a classroom, depicting emotional distress
Digital Shield Protecting Online Data and Information with Checkmark.
Abstract silhouette of person curled up in a fetal position.
From vitality to vulnerability illustrating the profound difference between healthy and unhealthy lung conditions and their human impact
Phishing Icon Different Style Outline Collection Set Vector Illustration
securityrisk line icon
Threat Response strategy preventing phishing, analyzing risks, testing vulnerabilities, and protecting against malware attacks
Digital Shield with Padlock Symbol Representing Cybersecurity and Data Protection.
Governance risk factors cosercily human everhoit bystanders and related issues
Crying alone in darkness with a single seated figure illuminated by a faint overhead light symbolizing isolation and emotional vulnerability. Subtle shadow
Set of four warning icons displaying different types of system errors
Cybersecurity Icon Set – Vector Collection for Data Protection, Threat Prevention & Risk Management
Continuous single line drawing depicting a chain with a broken link symbolizing weakness vulnerability and the breaking point ideal for corporate presentations on challenges
Cyber Crime Attack. Cyber Security Alert With Glowing Unlock Icon In Red Protective Sphere, Digital Cybersecurity Warning Banner For Online Safety, Futuristic Tech Threat Concept, Vector Illustration
A black, broken padlock against a white background, symbolizing vulnerability or breach
A person embracing vulnerability, sharing their feelings with a friend. Icon set. Set Logo of A person embracing vulnerability, sharing their feelings with a
Technology, cybersecurity, AI development, data visualization, malware alert, robotics. Pie chart, bug warning triangle and robot figure with a backpack. Technology and cybersecurity concept
Vulnerability Icon
Isolation and Emotional Cornering Icon
Cyberattack on a fortified server room with shield and hackers
Supply chain problem, risk vulnerability industrial business, connection management chain together into concept, fatigue businessman manager holding metal to chain together
Conceptual Illustration of Digital Security and User Authentication Process.
Emotional risks workplace scenario where a person hesitates to share ideas with colleagues while small sparkle and line icons emphasize courage, vulnerability,
Poet on stage. A single speaker standing at a microphone, reading from a notebook under soft spotlight accents. The scene conveys focus, vulnerability, and
Human silhouette with a shattered heart graphic illustrating emotional pain and vulnerability on a stark white background, symbolizing inner turmoil.
Cybersecurity shield icon with a keyhole and circuit board design
Exploit icon collection designed for web and mobile applications, featuring warning symbols, vulnerability indicators, and modern security graphics suitable for cybersecurity interfaces
Security Engineering icon set. Testing, Firewall, Monitoring, Disaster Recovery, Training, Data Protection, Analysis, Vulnerability. Duotone color solid and editable outline icons
Minimalist outline illustration of a fractured protective barrier depicting vulnerability and damage
Cybersecurity vulnerability scanner and risk assessment console icons
Woman sitting, head in hands, surrounded by barbed wire, seeking escape
Futuristic chrome humanoid legs on cracked glass surface with stone, cybernetic strength and vulnerability concept at sunset
Security check list and shield icon.
Digital Security Shield - Protecting Online Data and Information.
Weaknesses icon set in line and glyph style on black and white background
A striking silhouette depicts the stages of human life from infancy to old age showing growth and progression
Isometric Data Security Cube with Padlock and Cloud Connection.
Contrasting depictions of a padlock symbolizing security and vulnerability
Business team identifying a vulnerability point on a strategic network map, planning and risk management concept.
Conceptual illustration of data security, protection, and privacy measures.
Supply chain problem, risk vulnerability industrial business, connection management chain together into concept, fatigue businessman manager holding metal to chain together
Cybersecurity shield protecting digital data servers from threats.
Vulnerable Protect Concept: A stark visual representation of the contrasting concepts, where the vulnerability is juxtaposed with the necessity of protection, making a strong statement.
Minimalist vector icon of an closed padlock. Represents security access, vulnerability, data freedom, or privacy settings. Bold black and white circular silhouette for UI/UX design. (187 chars)
Emotional risks interpersonal scene where a person hesitates to express feelings to a friend while small sparkle and line icons emphasize vulnerability,
A business continuity and digital protection scene representing vulnerability assessment as a safeguard against threats, where a coordinated team identifies and resolves issues
Cyber security hacking icon set featuring terminal window with skull symbol representing malware virus attack data breach and system vulnerability
Cybersecurity icons: cracked shield with bug for zero-day exploit and question mark in circle with padlock for unknown vulnerability with exploit icon with line art with data breach with danger sign
Cybersecurity data theft concept. Hacker stealing digital information from computer system minimal line art vector illustration emphasizing financial and digital vulnerabilities
31 - 40
Cybersecurity concept depicting a lock shield and hooded hacker figure
Collection of various broken black silhouette icons, including a heart, shield, chain, and skull, symbolizing fragility, damage, and failure in a clean graphic style
Collection of black human silhouettes in various crouching and sitting poses Keywords: silhouette, people, human, figure, man
Cyber Security Shield Logo with Digital Lock Icon.
Fragile soul visualized as a seated figure with subtle cracks along the body, tiny floating shards and decorative stars emphasizing vulnerability, reflection,
A person embracing vulnerability, sharing their feelings with a friend. Icon set. Set Logo of A person embracing vulnerability, sharing their feelings with a
Flat illustration of man managing cybersecurity for remote work telecommuting security
vulnerability search icon. Vector illustration
A lone figure stands atop a submerged house representing climate change impacts and vulnerability a stark silhouette high quality professional detailed
Conceptual illustration of data transfer and cloud computing technology.
A bird's nest with an egg inside viewed from directly above in a natural setting
Next page
/ 10