Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Data Breach Icon
Security Testing Icon
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Vulnerability Vector Design
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Bug Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Penetration Testing Icon
Safe mode technology icon in the technological comb bacground
Risk icon vector image. Can be used for Compilance and Regulation.
Login Password Laptop Composition
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Penetration Testing Icon
Finger pointing at cyber security lock
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
lock With Keyhole on digital data background
Threat Assessment Icon
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Debug icon symbol collection on white background.
Zero Day Multistyle Icon Set
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Penetration Testing Icon
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Malware icon with long shadow
Hacker icon cyber spy, hacker icon, hacker icon set.
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Computer Problem User Composition
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Hacker activity icon set collection. Simple line vector.
Software Testing Debugging Flat Icons - Red Line Art Style - Checklist Gear Wrench Bug Computer Browser
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
malware, cyber attack line vector icon
Cyber scanner Icon
Weakness Outline Icon
Analytics Icon
phone virus hack icon sign vector
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Exploit Icon
Protection background. Technology security, encode and decrypt, techno scheme
Risk Assessment Icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Flat minimal icons for data breach, cyber threats, hacking, system risk, password leaks, unauthorized access, virus, phishing, database security, and encryption.
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Security shield with exclamation mark warning icon
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Security Testing Icon
Risk management line outline icon
Risk management process, business vector concept
malware, cyber attack or virus line icon
Vulnerability Icon
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Ethical hacker. Character conducting a security penetration test. White
vector icon of a document with a shield with a blue background in the shape of a shield
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
unprotected
Protection background. Technology security, encode and decrypt.
Bug Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Cloud security vector line icons set. Cloud, security, infrastructure, data, authentication, compliance, encryption illustration outline concept symbols and signs
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Abstract technology security  global network background, vector
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Print
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Software quality assurance, cybersecurity firewall, system, software icon
Risk management mind map flowchart business concept for presentations and reports
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Programmer at work. Computer assisted design, developer testing program.
System administrator online service or platform. Technical work with server
脆弱性診断のアイコン
Vulnerability Assessment Icon
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Maintenance smartphone technology search system
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Risk Icon
Vulnerability text with decimal number background
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Vulnerability Icons
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Abstract technology security on global network background, vector illustration
risk management asset vulnerability assessment concept
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Next page
/ 10