Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Cyber Defense Icons: a collection of detailed and visually engaging icons, perfectly tailored to represent various aspects of cybersecurity. The icons are crisply designed.
Icons for phishing, email scams, data breaches, and cybersecurity risks in vector format.
Mutual Support Giving up seat in public transport -modern flat vector concept illustration of man offering his seat to elderly woman on bus A metaphor of voluntary, collaborative exchanges of services
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Hacker Logo Design Illustration
Information Technologies Horizontal Banners
Abstract technology security global network background, vector
A touching illustration of a young woman sitting in a reflective pose, representing deep thought and hope, ideal for discussions around mental health and self-care.
Zero Day Icon
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Fairskinned woman uses a laptop with two padlock icons alongside her figure on a light backdrop
Threat Icon
Recognizing problems and addressing system malfunctions is crucial for maintaining operational efficiency and preventing further complications in network performance, silhouette
Risk icon vector image. Can be used for Compilance and Regulation.
malware, cyber attack line vector icon
Breach icon multiple style
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Collection of Broken Doors, Depicting Vulnerability and Damage
Decryption Icon
A vibrant image illustrating the concept of detecting bugs in technology, bugs on a circuit board under magnification.
Editable vector icons for phishing, online security threats, and cybercrime. Includes symbols for phishing emails, fraud, hacking, data breaches, and online safety warnings.
Vulnerability Icon
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
vulnerability
Data Breach
Print
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Cyber Threat Icon
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
Protection background. Technology security, encode and decrypt.
Woman works on her computer secured by lock icons against background transparency
Businessman superhero with a shield protecting from cyber attack. Security, safety, and privacy concept. Data protection, antivirus, and insurance metaphor for business.
Silent Anguish: A digitally crafted portrayal of a person, eyes closed, hands cradling the face in a pose that expresses distress, invoking empathy.
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Elderly man walking with cane under tree silhouette in black and white illustration
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Zero-day exploit web banner or landing page. Computer-software
Information Security icon set blue highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline concept vector illustrations
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Online Robbery Icon
Illustration showing various cybersecurity icons including firewalls and data protection methods
vulnerability
Security assessment icon set multiple style collection
A man's silhouette finds shelter from a tempest under an umbrell
Sql Injection
System Vulnerability Icon
Adobe Illustrator Artwork
Insecure Teenage Boy Lacking Confidence Under Pressure of Unrealistic Masculinity Expectations, Emotional Struggle, Self-Doubt, Mental Health Concept, Vector Cartoon Illustration
Cartoon hacker with red hoodie uses a laptop surrounded by colorful padlock icons
3D Cartoon Ecology Metaphor
Solitary Reflection: A person sits alone within a spotlight's glow, enveloped in an atmosphere of introspection, emphasizing human emotion and the complexities of solitary moments.
Cloud computing security breach for internet of things
Security vector illustration word cloud isolated on a white background.
Cyberstalking concept. Online surveillance and privacy invasion. Anxious employee at computer watched by hacker. Internet security threat, data theft, cybercrime. Workplace spy.
Broken link RGB color icon. Hyperlink that no longer points to its original destination. Error in webpage working process. Isolated vector illustration
thin line risk management or search of vulnerability
Cyber security outline icon set. Internet protection, data privacy, secure browsing, network vulnerability, virus, malware, bug, and computer infection vector symbols.
Print
Security Icon
Understanding Cloud Computing Errors and Connectivity Issues Prompting System Alerts and Warnings Affecting Network Performance
Blind businessman metaphor for risk, failure and crisis. Lost cartoon manager walking into traps, facing financial problems, dangers, and mistakes. Business concept vector.
A simple illustration depicting two figures in a restroom setting.
Film noir crime scene with woman running from a stalker. Frightened female victim escapes a shadowy pursuer in a dark city alley at night. Concept of danger, fear, suspense.
Claustrophobic journey: A man's arduous crawl through confined u
Global Network Security Protecting Data Worldwide
Cyber Threat Icon
Market Data Icon  in black line style icon, style isolated on white background
Insecure Teenage Boy Lacking Confidence Struggling with Unrealistic Masculinity Expectations, Emotional Vulnerability Concept, Mental Health Awareness, Vector Cartoon Illustration
System Vulnerability Icon
Illustrations showcasing varied emotional states interpersonal dynamics monochrome drawing of
Homeless People Sleeping on Park Benches Silhouettes
Secure Cloud Computing Data Protection and Privacy
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Cartoon office worker on laptop under hidden hacker stalker surveillance from shadow, illustrating online privacy invasion, workplace cybersecurity breach and digital spying threat vector illustration
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Thief Stealing Money Tree from Businessman's Head, investment loss, stolen ideas, fraud, intellectual property theft, economic downturn, financial crime, create engaging visuals,
Hacker attack and web security metaphor. Cyber criminal with laptop stealing user personal data. Internet phishing, fraud and identity theft concept. Privacy data protection.
Hacker attack concept vector icon. Cyber crime and web security metaphor. Anonymous man with laptop. Computer data breach, phishing, malware, virus threat. Cybersecurity.
Mobile phone banking scam, fraud link to steal money. Phishing bait website or online crime concept. Thief steals money from mobile banking app. Hacker cybersecurity crime.
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
Blind businessman navigating a field of traps, a business metaphor for risk, danger, and crisis. Conceptual vector illustration of failure, uncertainty, challenge, and mistakes.
Six icon Illustrations Representing Online Phishing and Cyber Security Threats with Creative Visuals
Concept of fear and danger. Scared woman runs from a shadowy pursuer in a dark city alley. Victim of crime, stalking, and harassment escaping a menacing threat. Noir style.
Monochrome Depiction of a Figure with Possessions Wrapped in Pla
weathered wooden pier partially submerged in water showcasing a flood scene  Illustrative style clear composition evokes a sense of vulnerability and nature's power
System Vulnerability Icon
find strength in vulnerability kindness art. Groovy retro vintage hippie spiritual girl aesthetic message. Cute love text shirt design and print vector
Safe mode technology icon in the technological comb bacground
Vector Risk management process diagram schema
Troubleshooting mobile application errors resolving technical glitches and providing effective user support solutions for digital platforms
Wrecking Ball Hits Falling Dominoes Metaphor for Business Crisis, Financial Risk, Instability, Chain Reaction, Failure, Economic Collapse, Disruption, Uncertainty, Setback Vector Illustration
Data protection and network security concept with shield and lock. Cybersecurity technology illustration with password, key, hacker attack, spam, and privacy access control.
Cybersecurity Shield with Lock and Network Nodes Icon
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Security warning Icon
Certified Ethical Hacking icon showing security and hacking idea
Cyber criminal hacker in a black hood using a laptop for an internet attack. Concept of web security breach, phishing, and stealing personal data from a computer system.
Next page
/ 10