Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Security Testing Icon
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Sign of Meltdown and spectre vulnerability on notebook monitor
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Programmer at work. Computer assisted design, developer testing program.
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Abstract technology security on global network background, vector illustration
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Exploit Icon
Vulnerability text with decimal number background
Identity management blue gradient concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Myriad Pro-Bold font used
handicap
Computer security specialist online service or platform. Idea of digital
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Security Vulnerabilities Blue Icon
Different types of cyber attacks, hacking and malware concepts represented by colorful icons
Young Woman Seeing Herself Worthless, Failure And Smaller Than She Really Are. Low Self-Esteem Concept. Vector Flat Cartoon Illustration. Sad Woman Feeling Low Confidence In Her Abilities.
Vulnerability Vector Design
Supply Chain Risk Icon
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Security scan flat line icon set. Security scan Thin line illustration vector
Cyber Threat Icon
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
vulnerability cyber security system illustration lock symbol circuit broken
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Bug fixing doodle for improve website performance
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Security Vulnerabilities Flat Icon
Icono escudo alarma color FB reflejo
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
ネットワークセキュリティのイメージイラスト
Penetration Testing icon vector image. Can be used for Business Audit.
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Vulnerability Icons
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Cyber or web security online service or platform set. Digital data
Risk management mind map flowchart business concept for presentations and reports
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Laptop icon infected by malware with long shadow on white backgr
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Hacker in a mask
Security icons set vector with shadows on white background
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Software quality assurance, cybersecurity firewall, system, software icon
Penetration testing vs vulnerability scanning flat style background design.
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Abstract technology security  global network background, vector
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
password leak out and got data breach to hacker
Sql Injection
malware, online scam, virus in computer vector icon
*Stamp11
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
vector icon of a document with a shield with a blue background in the shape of a shield
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Print
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
hacker logo. vector. editable.
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Magnifying glass searching for viruses, malware, software bugs
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Risk management process, business vector concept
Certified Ethical Hacker - CEH - icon set & web header banner
Analytics Icon
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Information Technologies Horizontal Banners
 Essential Vulnerability Icon for Cybersecurity
Unsecure server Icon
Penetration Testing Icon
malware, cyber attack or virus line icon
Disruption Icon
Vector light Risk management process diagram schema
Hacking Icon
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Threat Icon
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
 Icon of Security Patch for Vulnerability Management
Cyber threat Icon
Next page
/ 10