Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Failure Vector  Or Logo Sign Symbol Illustration
Flat illustration of man managing cybersecurity for remote work telecommuting security
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple flat vector illustration.
Bankruptcy Risk Icon
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
ネットワークセキュリティのイメージイラスト
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Threat Intelligence Icon Lineal Blue Style
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Cracked plate symbolizing fragility, broken dreams, and unexpected setbacks
Risk Icon
Different types of cyber attacks, hacking and malware concepts represented by colorful icons
Cyber Threat Icon
Zero Day Icon
Hacked line icon
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Risk Icon
 Risk
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Security Holes Blue Icon
Weakness Icon
malware flat gradient icon
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Shared Risks Blue Icon
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Exploitation Icon
Mental health issues concept. Flat vector illustration
Cyber threat Icon
Flat isometric illustration concept.  security network
Neon half tone shield representing vulnerability in digital world with glowing lines
Exploit Icon
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
virus in mail icon sign vector
Risk Icon
Risk
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Flat illustration of woman managing IoT security internet of things protection
Weakness Lineal Blue Icon
Bankruptcy Risk Icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Open Source Icon
Risk Icon
Penetration Testing Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
broken padlock glyph icon
Exploitation Icon
cyber security icon sign vector
Risk Icon
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Exploit Icon
Zero-Day Exploit icon line vector illustration
virus line icon
Risk Icon
Vulnerability Icon
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Weakness Dual Tone Icon
Weakness Icon
Emotional Vulnerability Icon
Virus on laptop, malware or network vulnerability vector
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Risk Assessment Icon
Shared Risks Glyph Icon
thin line assess icon like review audit risk
Exploitation Icon
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Cyber scanner Icon
Unsafe Icon
Proactively address vulnerabilities to enhance security and reduce the risk of internal threats or breaches
Zero Day Icon
Hacker activity icon set collection. Simple line color vector.
Ethical hacker abstract concept vector illustration.
Risk Icon
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Threat Assessment Icon
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Weakness Outline Icon
Vulnerability Icon
Two faces are shown, one is black and the other is white. The faces are broken and cracked, giving the impression of a shattered or fragmented identity. Concept of loss, confusion, and vulnerability
Cloud computing security breach for internet of things
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Learning about self, A figure stands atop an oversized hand, showcasing a harmonious blend of strength and vulnerability, inner work concept
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
System administrator online service or platform set. Technical work with server
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Person in warm layers huddles on ground against cold. Urban scene shows vulnerability in winter setting. Looking down, expressing hardship. Concept: winter shelter, homeless outreach, cold weather aid
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Zero Day Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Crime scene on a laptop
Risk Icon
Next page
/ 10