Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Risk management line outline icon
Security scan flat line icon set. Security scan Thin line illustration vector
Security Testing Icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Vulnerability Icon
computer cyber security icon sign vector
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Disruption Multistyle Icon Set
Bug Icon
Cybersecurity threat concept with syringe injecting malware into computer chip, data breach risk, digital attack, virus protection, vector design element
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Certified Ethical Hacker - CEH - icon set & web header banner
Crime scene on a laptop
Ethical hacking and cybersecurity icon set for security, featuring hacker, data protection, and network threat symbols for digital defense, white hat operations, and vulnerability assessment.
malware, cyber attack or virus line icon
vulnerability search icon. Vector illustration
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Icono escudo alarma color FB reflejo
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Risk Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Supply Chain Risk Icon
Security Breach Icon
*Stamp11
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Risk Icon
Security warning shield indicating a potential threat or vulnerability
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Vulnerability Management and analysis security hacker
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Threat Assessment Icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Programmer at work. Computer assisted design, developer testing program.
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
vulnerability line icon
Set of six minimalist warning icons simple flat vector design element isolated on white background
Risk Assessment Icon
Cybersecurity concept warning on hacker laptop
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
risk management asset vulnerability assessment concept
Risk management process, business vector concept
Ethical hacker. Character conducting a security penetration test. White
Bug Icon
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Illustration depicting a person in fetal position expressing despair and vulnerability showcasing mental health concept in a minimalistic style
Target on a person's head, symbolizing threat or danger
Mitigation Plan Icon Collection and Simple Concept Outline Color, Containing: Climate Change,Green Environment,Evacuation Plan,Ecology,Reduction,Notification,Community,Task List,Disaster Recovery
Grunge rubber stamp impression displaying Unstable Structure as a warning for foundational vulnerability
Cybersecurity process: identify, protect, detect, respond, recover
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Flat illustration of man managing cybersecurity for remote work telecommuting security
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Security Vulnerabilities Flat Icon
脆弱性を表すパズル
Hacker in hoodie using laptop for cybercrime with unlocked padlock symbolizing data breach and security vulnerability
Risk Management Icon Set Multiple Style Collection
Cyber security bug icons vector illustration set with malware, virus, hacking, error and warning symbols, black line software protection elements for web, system security design
Green boxing glove striking a user profile icon below a minimalist cloud, symbolizing cyber threats, privacy, conflict, strength, security, vulnerability. Ideal for risk, protection simple flat
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Computer security specialist online service or platform set. Idea of digital
Cybersecurity concept warning on hacker laptop
Magnifying Glass Inspecting Warning Sign Risk Analysis Icon
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
user protection icon sign vector
Outline neon pc malware icon set. Glowing neon system unit and monitor screen frame with bug sign, cyber security hack pictogram. Error debug, software bugs, hacker and virus attack.
Computer Problem User Composition
Dark Web Hacker Deal: Cyber Crime, Online Fraud, Data Breach. Anonymous Criminal Buying Stolen Information. Internet Security Concept. Digital Piracy and Cyber Attack.
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Data Breach Alert Silhouette Icon
An illustration of a solitary senior man sitting pensively on a park bench
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Secure Icon Matrix. Secure Setup Set linear set: config matrix, authentication key, encryption lock, protocol setting icon, secure parameter tile, vulnerability scan marker,
Lonely teenager curled up in a ball expressing sadness and vulnerability  illustration, depicting an emotional state on white background
Close-up portrait of a hamster with tears on its face, showing distress and vulnerability
Understanding and preventing computer viruses and malware threats to digital security
an elderly woman coughing with virus particles spreading in the air. The image highlights health risks, virus transmission, and vulnerability of seniors to infectious diseases. Suitable for healthcare
Crisis Emblem Logo Variations. Facing a personal crisis with vul
DNA Helix Disintegrating into Black Awareness Ribbon. Symbol of Genetic Disease, Loss, and Remembrance Vector Illustration.
Silhouette of a woman curled up in despair with scattered dark petals symbolizing loss
System administrator online service or platform. Technical work with server
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Cyber attacks blue word concept. Phishing attack. Data protection. Software vulnerability. Horizontal vector image. Headline text surrounded by editable outline icons. Hubot Sans font used
Stages of a cybercrime infographic 5 steps. System vulnerability, digital service. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Cyber threat word concept isolated on white. Access management, system hacking. Software vulnerability. Creative illustration banner surrounded by editable line colorful icons. Hubot Sans font used
Internet Security Isometric Design Concept
Despondent man illustration showing feelings of solitude and despair in grayscale color palette, conveying sadness and vulnerability in a minimalist
Next page
/ 10