Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Botnet Icon
Vulnerability Icon
Threat Detection Icon – Identifying Vulnerabilities in Systems- Editable stroke vector line icon
Protection background. Technology security, encode and decrypt, techno scheme
Threat Detection Outline Icon
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
Breach
Healthcare and Medical Line Icon Set and Banner Design
AI cybersecurity risks and machine learning vulnerabilities in digital security. AI security threats, data breaches, hacking risks and advanced protection strategies. Cybersecurity vector illustration
Vulnerability Glyph Icon
Illustration of an icon showing a baby crawling toward a bottle of poison, symbolizing a potential danger or safety hazard
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
network global security icon with shield
Security Risks Icon Style
Risk Icon Solid Black Style
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Zero Day Exploit Icon
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Data breach outline icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Patch Icon
Vulnerability Icon
Security Breach Icon
Virus icon
Vulnerability Glyph Icon
Rockets labeled DDoS targeting a secure password field, clipboard with a checkmark. Ideal for cybersecurity, passwords, hacking, protection, vulnerability, threat detection, abstract line flat
Breach
Healthcare and Medical Line Icon Set and Banner Design
Security Testing Icon
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Businessman investor falling from unstable stack of money coins, financial instability and economic recession concept
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
Sharp cracks radiating outwards from a hole in a broken pane of glass creating a dramatic, dangerous image of damage and destruction on white background
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Abstract symbols flat design long shadow glyph icons set
Malware bug target icon. Simple outline style. Network vulnerability, virus, malware, ransomware, fraud, spam, phishing, scam, hacker attack, IT security concept. Thin line symbol. Editable stroke.
Unhappy Woman Reporting Smartphone Hacker Attack and Malware
Security Vulnerability Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Escalation Icon
Zero Day Icon
Data Breach glyph icon
Bug black glyph style icon
Vulnerability Flat Icon
Vulnerability Duoline Icon
Missiles labeled DDoS flying toward a document with checkmarks, visualizing cyberattacks and security threats. Ideal for cybersecurity, hacking, IT risks, online vulnerability, data protection
Healthcare and Medical Line Icon Set and Banner Design
Supply chain problem, risk or vulnerability of industrial business,flat characters.
Cybercriminal Hacking Laptop, Data Theft, And Online Fraud In Flat Vector Illustration Symbolizing Cybercrime, Digital Threats, And Hacking Risks, Isolated On White Background.
Key and lock security icon. Access granted.  Symbolizing safety, protection, and secure entry.
Zero Day Exploit Icon
Human Head Trapped in Cage, Symbolizing Mental Health Struggles, Addictions, and Societal Repression
One Line Journey to Authenticity: Unmasking the True Self
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Data breach outline icon
Unhappy Woman Reporting Smartphone Hacker Attack and Malware
Set of 8 "weakness" icons, 1 unexpanded, 1 silhouette - Weakness icon representing fatigue low energy or vulnerability ideal for health n wellness applications
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Hardening Icon
Zero Day Icon
Risk Factors Icon
System Vulnerability icon
Malware Outline Color Icon
Breach Broken Error Icon
Brain served on a plate between fork and knife, VPN shield, exclamation mark, and risk text. Ideal for cybersecurity, mental health, online privacy, decision-making, vulnerability awareness
Healthcare and Medical Line Icon Set and Banner Design
Unprotected Website Vector Icon
Cybersecurity Threats, Male Hacker With Laptop in Flat Vector Illustration Symbolizing Data Breach, Malware, and Digital Security Risks, Isolated on White Background
Computer security specialist online service or platform set. Idea of digital
Zero Day Exploit Icon
Risk Icon
The Metamorphosis: Embracing Authenticity through Self-Discovery
Security Update Flat Icon Design
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Keylogger outline icon
Online Robbery Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Emergency Responders Carry Children and a Dog To Safety Through A Flooded Area, Illustrating Bravery, Risk
Botnet Icon
Exploit Icon
Ethical hacker isolated cartoon vector illustrations.
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Vulnerability Blue Icon
Abstract technology security global network background, vector
Lock symbolizes cybersecurity, bug flying toward digital storefront. Ideal for security, bug tracking, online privacy, e-commerce protection, system vulnerabilities, digital threats, online safety
Healthcare and Medical Line Icon Set and Banner Design
Safe mode technology icon in the technological comb bacground
Cyber Attack On Laptop With Malware And Warning Sign In Flat Vector Illustration Symbolizing Data Breach, Online Security Threats, And Hacking Risks, Isolated On White Background
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
email with virus, phishing vector icon
Zero-day exploit web banner or landing page. Computer-software
Cybersecurity issue icon
Security Patch Flat Icon Design
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Risk icon vector image. Can be used for Compilance and Regulation.
Online Robbery Icon
Businessman investor falling from unstable stack of money coins, financial instability and economic recession concept
Vector Risk management process diagram schema
Next page
/ 10