Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Financial Risk Icon
lock With Keyhole on digital data background
Risk management line outline icon
Failure Mode Flat Icon
Solid black icon for Vulnerability
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Exploit Multistyle Icon Set
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Icono escudo alarma color FB reflejo
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Vulnerability Vector Design
Risk Icon
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Compliance Icon
Abstract technology security on global network background, vector illustration
Open door with heart symbolizes trust and openness.
Bankruptcy Risk Icon
shield glyph icon
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Weakness Identification Outline Icon
脆弱性診断のアイコン
Vulnerability Assessment Icon
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Exploit Icon
Computer security specialist online service or platform. Idea of digital
Flat illustration of man managing cybersecurity for remote work telecommuting security
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Open backdoor in a black wall cybersecurity concept illustration
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Risk Icon
Security Testing Icon
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Security Consulting Icon
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Weakness Icon
chains glyph icon
website bug concept. errors, problems, defects or gaps contained in the website. illustration of a browser window, website symbol, and insect. symbol or icon. minimalist 3d style design. graphic
Weakness Identification Lineal Blue Icon
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Zero Day Icon
Simple set of vulnerability related filled icons.
Threat Vector Icon Design
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Bug fixing doodle for improve website performance
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Risk Icon
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Security Consulting Icon
Risk Assessment Icon Element For Design
Data breach, cyber attack threat and hackers danger warning alert red banner, vector digital technologies and cyber network security. Data breach warning screen background with binary code numbers
Bankruptcy Risk Icon
fire glyph icon
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Weakness Solid Black Icon
Password Cracking icon line vector illustration
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Certified Ethical Hacker - CEH - icon set & web header banner
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
Zero-day exploit web banner or landing page. Computer-software
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Risk Icon
Devsecops Icon
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Threat Mitigation Icon
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Weakness Icon
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Information Technologies Horizontal Banners
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
malware, online scam, virus in computer vector icon
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Zero Day Icon
Vector light Risk management process diagram schema
password leak out and got data breach to hacker
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Hacker Logo Design Illustration
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Laptop and cybercrime
Sql Injection
Risk Icon
Achilles' Heel
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Cyber Risk Icon
Cyber or web security online service or platform set. Digital data
Vulnerability Icons
Next page
/ 10