Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
AI in Cybersecurity abstract concept vector illustrations.
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Risk icon vector image. Can be used for Compilance and Regulation.
Security assessment icon set multiple style collection
Risk Assessment Icon
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Isometric cybersecurity icons with warning symbols in vector art
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Vulnerability Vector Design
Abstract technology security on global network background, vector illustration
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Cybersecurity breaches, malware, coding, software vulnerabilities, hacking prevention, online protection. Developer writing code, bug and Trojan horse symbols. Cybersecurity and malware ion
Maintenance smartphone technology search system
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Threat Detection Glyph Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Broken shield icon simple vector isolated symbol
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Security Testing Icon
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Malware icon with long shadow
Cyber or web security online service or platform set. Digital data
A minimal set of 24 solid glyph icons representing cybersecurity, data privacy, and network protection concepts for technology
wind damage icon sign vector
Risk Management Risk Management Bundle H50
Analytics Icon
Weakness Outline Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Vulnerability Icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
lock With Keyhole on digital data background
Cybersecurity, DDoS attacks, network vulnerability, internet threats, wireless communication, online safety. wireless symbol, person analyzing data rockets labeled DDoS. Cybersecurity and DDoS
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
password leak out and got data breach to hacker
Hacker in a mask
Hearing loss concept. Human ear disease or disability. Deaf person
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Security Vulnerabilities Outline Color Icon
Cybersecurity process: identify, protect, detect, respond, recover
Security scan flat line icon set. Security scan Thin line illustration vector
脆弱性診断のアイコン
Vulnerability Assessment Icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
malware flat gradient icon
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Cyber Security Icon Sheet Multiple Style Collection
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Security Risks Icon Style
Software security vulnerability assessment using robots and professionals
Cyber scanner Icon
Certified Ethical Hacker - CEH - icon set & web header banner
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Cloud security vector line icons set. Cloud, security, infrastructure, data, authentication, compliance, encryption illustration outline concept symbols and signs
Ethical hacker set. Character conducting a security penetration test. White
phone virus hack icon sign vector
Security Holes Blue Icon
Risk Icon
Broken shield icon vector outline set illustration sign
Zero Day Multistyle Icon Set
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Virus Infected icon in vector. Logotype
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Security Testing Icon
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Global supply chain disruptions impacting business operations and financial stability worldwide
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Security Scan Icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Penetration Testing Icon
Cybersecurity issue icon
Digital lock protect data flow in global network
Weakness Identification icon set multiple style collection
Next page
/ 10