Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
malware, online scam, virus in computer vector icon
Sql Injection
Identity management blue gradient concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Myriad Pro-Bold font used
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Red arrow hitting the target, depicting security threats and data breach concepts, with focus on vulnerability and protection
Print
Rhino in Sepia: A powerful rhino stands boldly in its natural habitat, rendered in a sepia tone, against an illustrative background that captures the essence of the wild.
fishing identity theft icon sign vector
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Cyber Attack Solid Black Icon
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Certified Ethical Hacker - CEH - icon set & web header banner
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
vulnerability cyber security system illustration lock symbol circuit broken
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Silent Contemplation: A silhouette of a woman deep in thought, captured in a moment of introspection, her posture revealing vulnerability and the weight of contemplation.
Security Testing Icon
Analytics Icon
malware, cyber attack or virus line icon
Data Center Security Cloud Server Protection with Technicians.
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Black line icon for Vulnerability
Risk management and financial business danger evaluation tiny person concept, transparent background.
Risk management process, business vector concept
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
Cyber Threat Icon
System Vulnerability Icon
Cyber attack and security threat concept. Hand holding phone with error message, virus warning, and spam alert. Hacking, network failure, data breach, malware, phishing danger vector.
Data Breach Icon
Risk Icon
Hacker Solid Black Icon
Vulnerability Tools Icons. Outline style icons of Vulnerability Assessment Tools: vulnerability scanner radar, CVE list sheet,
Hacker trying to break into a website security system with skull
Vulnerability Assessment Icons. Isometric Flat icon set of vulnerability assessment activities: vulnerability scanner, CVE
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Security shield icon set with lock star checkmark bolt broken and keyhole featuring black and white symbols
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Crying child with teddy bear sits amidst rubble, expressing deep emotion in a minimalistic setting, evoking feelings of loss and vulnerability with copy space
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Social Vulnerability Icons. Outline icon set of social vulnerability factors: income gap bar, elderly figure, single parent icon,
Sad girl expressing vulnerability in digital illustration, emotional awareness
Bugs Icon Set Multiple Style Of
Patch software. Operating system updates that address security vulnerabilities
unlocked computer access icon sign vector
Collection of white security icons displayed on a black background, representing protection and safety.
Securing Digital Identity Role: User Access Governance In Cybersecurity Management
Sensitivity Icon
Data Breach Icon
Disruption Icon
Bug detection software debugging code error computer virus malware security vulnerability analysis tool
Vulnerability Tools Icons. Outline style icons of Vulnerability Assessment Tools: vulnerability scanner radar, CVE list sheet,
Security Testing Icon
Vulnerability Icons Grid. Solid, filled icon set of vulnerability and openness: open door, exposed heart, eye with tear, light
Security and threat vector icons illustrating digital safety and vulnerability issues
Software Vulnerability Icons. Outline icon set of software vulnerability types: zero-day bug, privilege escalation, race condition
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Penetration Testing Icon
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Social Vulnerability Icons. Outline icon set of social vulnerability factors: income gap bar, elderly figure, single parent icon,
Anxious South Asian woman expressing concern, emotional vulnerability
Cartoon vector illustration of a sad woman sitting with knees drawn up, symbolizing emotional exhaustion and vulnerability against dark background
Woman Working On Patch Management At Home With Laptop Technology Solutions
an elderly woman coughing with virus particles spreading in the air. The image highlights health risks, virus transmission, and vulnerability of seniors to infectious diseases. Suitable for healthcare
password fishing attempt icon sign vector
Database breach icon with a cracked server symbol representing a data leak damage or security system vulnerability A vector for hacking risk and information loss
Cracked ground, a sign of vulnerability and environmental damage.
Data Breach Icon
Disruption Icon
Various icons representing different human emotions and mental states depicted in a simple, monochromatic style for educational purposes
Virus warning pop-up on desktop shows threat, indicating potential system failure. Computer screen displaying virus warning pop-up on desktop highlights online dangers, system vulnerabilities
Security pursuit showing a thief running away with a password being chased by a policeman, illustrating data protection and cybersecurity.
Vulnerability Icons Grid. Solid, filled icon set of vulnerability and openness: open door, exposed heart, eye with tear, light
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Cybersecurity Icon Set. Solid, filled icon set of proactive cybersecurity measures: penetration test, vulnerability scan, security
Hacker with laptop stealing personal data and financial information. Cyber security and internet privacy concept. Phishing attack, malware, virus, cybercrime, and network security.
Security Pipeline Icons. Isometric Flat icon set of security in deployment pipeline: static code analysis, vulnerability scan,
Dramatic concept of a wing struck by lightning highlighting power and vulnerability
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
The evocative portrayal of a girl with a cracked face, a poignant exploration of vulnerability and resilience. The grayscale image conveys a sense of delicate fragility.
Sad child standing in the rain, expressing vulnerability
Cloud outline with a bug icon, conveying technological vulnerabilities and malware risks. Ideal for cybersecurity, cloud computing, data protection, technical issues, digital risk, IT maintenance
Hacker in a mask
Hands holding a tablet with bugs crawling on it representing software errors or vulnerabilities on device
Cyber Security Guard Shielding System Against Threat Vulnerability Attack
Collection of shield icons, representing protection and security.  Various states of the shield, from intact to broken, symbolize vulnerability and resilience.
Hooded Programmer Analyzing Code On Computer Screen For Cybersecurity Solution
Data Breach Icon
Disruption Icon
Cartoon vector illustration of a sad woman sitting with knees drawn up, symbolizing emotional exhaustion and vulnerability
Login Password Laptop Composition
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Risk Assessment Icon Element For Design
Software Vulnerability Icons. Outline icon set of software vulnerability types: zero-day bug, privilege escalation, race condition
Supply Chain Risk Icon
Next page
/ 10