Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Cybersecurity Risk Icon
Risk Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Risk Icon Outline Style. Vector Illustration For Graphic Design
Threat Icon
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Security Breach
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Vulnerability Assessment Icon
Exploit Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
A comprehensive set of icons illustrating various aspects of cyber attacks, including threats, defenses, and security measures.
user protection icon sign vector
Detection Icon
Weakness Outline Icon
Vulnerability Icon
A man holding a red heart in his hands with a concerned expression in a flat vector illustration depicting emotional vulnerability and introspection
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
cloud security icon sign vector
Criminal Assault Threat Icon
Cybersecurity Risk Icon
Cyber threat Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Risk Icon Outline Style. Vector Illustration For Graphic Design
Threat Icon
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Tiny Boat in Giant Wave Silhouette
Penetration Testing Icon
broken padlock glyph icon
Exploit Icon
Cybersecurity Icons Data Protection, Privacy, and Network Security
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Risk Icon
Failure Mode Blue Icon
Vulnerability Icon
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Insider Threat Icon
Penetration Testing Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Threat Icon
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Insecure Icon
Hacker activity icon set collection. Simple line color vector.
warning on browser icon sign vector
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Exploit Icon
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Emotional Vulnerability Icon
Penetration Testing Icon
Risk  Outline Icon
Zero Day Blue Icon
Vulnerability Icon
Broken shield icon Simple thin outline
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Insider Threat Icon
Cyber threat Icon
vulnerability line icon
Vulnerability Icon
computer protection icon sign vector
Insecure Icon
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Website bug detection software security vulnerability testing and malware analysis tool
phone virus hack icon sign vector
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
 risk
Emotional Vulnerability Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
hacker scammer computer technology. cyber security concept. attack and data digital. dangers of internet theft
Failure Mode Flat Icon
Vulnerability Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Ethical Hacking Icon
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Cybersecurity Risk Icon
Cyber scanner Icon
Computer Problem User Composition
Vulnerability Icon
Penetration Testing Icon
Insecure Icon
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Risk Factors Icon
Zero Day Icon
Vulnerability Icon
Risk Assessment Icon
Threat Icon
 Vulnerability Icon for Risk Assessment
Failure Mode Outline Icon
Vulnerability Icon
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Cyber Security Icon
Next page
/ 10