Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Failure Mode Blue Icon
Virus on laptop, malware or network vulnerability vector
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Zero Day Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Cybersecurity Risk Icon
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Magnifying glass searching for viruses, malware, software bugs
Emotional Vulnerability Vector Icon
Secure Coding Icon
 Comprehensive Vulnerability Icon for Protection
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Ethical hacker. Character conducting a security penetration test. White
Penetration Testing Icon
Vulnerability Management and analysis security hacker
Data Leak Icon
Risk Assessment Icon
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Zero Day Flat Icon
Flat isometric illustration concept.  security network
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Programmer at work. Computer assisted design, developer testing program.
Risk Icon
Security analysis or risk assessment, vulnerability assessment or threat detection, security audit or compliance check, data protection or encryption evaluation, network security or perimeter defense,
Cybersecurity Risk Icon
Vulnerability Icon
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Emotional Vulnerability Icon
Threat Icon
 Vulnerability Icon for Risk Assessment
Vulnerability Icon
Penetration Testing Icon
Penetration Testing Icon
Infrastructure Security Fill Icon Vector Illusrtation
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Penetration Testing Icon
Threat Icon
Security Holes Blue Icon
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Zero Day Icon
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Cybersecurity Risk Icon
Security Testing Icon
AI in Cybersecurity abstract concept vector illustrations.
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Vulnerability Icon
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
malware flat gradient icon
Penetration Testing Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Black line icon for Vulnerability
Security warning shield indicating a potential threat or vulnerability
Threat Icon
Security Vulnerabilities Outline Icon
Security Fill Icon Vector Illusrtation
Vulnerability Icon
Penetration Testing Icon
Exploit Icon
Security feedback or security audit feedback, vulnerability assessment or security review, risk evaluation or threat analysis, system performance feedback or security effectiveness review, penetration
Insider Threat Icon
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Ethical hacker abstract concept vector illustration.
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
Vulnerability Icon
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
 Security Testing Icon for Vulnerability Assessment
Cyber threat Icon
Cyber threat icon vector image. Can be used for Information Security.
Data Leak Icon
Risk Icon Outline Style. Vector Illustration For Graphic Design
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Zero Day Glyph Icon
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Security Icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Zero Day Icon
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
network warning glyph icon
Risk
Ethical Hacking Icon
Vulnerability Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Threat Icon
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Cyber threat Icon
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Cracked surface revealing a hole, breaking apart and fracturing, symbolizing themes of destruction, damage, and vulnerability while showcasing the impact of stress and pressure
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Next page
/ 10