Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Supply Chain Risk Icon
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
3D Isometric Cybersecurity vector icons sets Global Protection Firewall and Data Security
Certified Ethical Hacker - CEH - icon set & web header banner
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Ethical hacker abstract concept vector illustration.
Cybersecurity concept warning on hacker laptop
Security Testing Icon
Understanding and preventing computer viruses and malware threats to digital security
Threat Assessment Icon
Broken shield icon set. Vector line icons for security, vulnerability, and risk. Unsafe protection, defense failure, and data breach concept. Cybersecurity warning alert symbol.
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Cyber Security Icon
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Cybersecurity and privacy thin line icons set data protection and network security
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Protection background. Technology security, encode and decrypt, techno scheme
Risk Assessment Icon
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Vulnerability Outline Icon
virus line icon
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Programmer at work. Computer assisted design, developer testing program.
Flat illustration of three people placing warning cones around server security perimeter to prevent cyber threats with encrypted barriers
Website bug detection software security vulnerability testing and malware analysis tool
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
System Vulnerability Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Unhappy person floating on the kitchen pot, vector cartoon stick figure or character illustration.
Security scan icons set in black filled and stroke line style
Risk Icon Set With Multiple Style Collection
Computer security specialist online service or platform set. Idea of digital
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Vulnerability  White Icon Set Design
Patch Management Icon Lineal Syle
vulnerability line icon
4upict (1032).eps
Honeypot Icon
Set of ten minimalistic thin line icons representing cracked shields, symbolizing broken security, vulnerability, or failed protection. These vector graphics are ideal for web design, app interfaces
Conceptual illustration of a cloud security breach with an unlocked padlock icon representing data vulnerability and risk.
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
risk management asset vulnerability assessment concept
Grunge style rectangular rubber stamp displaying text IT SECURITY RISK, indicating potential digital vulnerability or cyber threat assessment
Abstract radial pattern of shattered glass with a central hole and radiating cracks on a light gray background
Set of 15 minimalistic thin line icons representing cracked shields, symbolizing broken security, vulnerability, or failed protection. Ideal for web design, app interfaces, banners, social networks
Risk management process, business vector concept
Set of mitigation Icons or symbols Vector fully editable file.
Scanner vulnerability detection vector analysis cybersecurity icons icon behavioral sandbox analytics grid
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple line vector
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Threat detection vulnerability scan security risk assessment icon vector eps silhouette
Ethical hacker. Character conducting a security penetration test. White
Risk Assessment Icons. Line style icons of risk assessment tools: risk matrix chart, likelihood vs impact icon, vulnerability
Distressed and fractured circle design representing vulnerability and fragility symbol
Cybersecurity Risk Icon
Spam link detected on computer web. Dangerous link concept.
Clickjacking White Icon Set Design
Ethical Hacking Icons. Ethical Hacking silhouette icon set: laptop with code, shield icon, hacker silhouette, vulnerability report, checklist document, firewall grid, magnifying
vulnerability search icon. Vector illustration
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Two people using laptop computers showcasing endpoint security, representing digital protection and cybersecurity solutions for data privacy
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Cybersecurity concept warning on hacker laptop
Security Vulnerabilities Flat Icon
 risk
Abstract technology security on global network background, vector illustration
Security icons set vector with shadows on white background
System Vulnerability Icon
Abstract technology security on global network background, vector illustration
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Certified Ethical Hacker - CEH - icon set & web header banner
Set line icons of risk management isolated on white
user protection icon sign vector
Outline Hacker Attack. Isometric Cyber Security Concept.
Outline neon pc malware icon set. Glowing neon system unit and monitor screen frame with bug sign, cyber security hack pictogram. Error debug, software bugs, hacker and virus attack.
Sad Girl in Despair: A young woman, hair cascading down, her body language betrays a deep sense of isolation. A melancholic portrayal of emotional vulnerability and the weight of sadness
Computer Problem User Composition
breach cyber security system concept illustration
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Certified Ethical Hacker - CEH - icon set & web header banner
Next page
/ 10