Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Information Technologies Horizontal Banners
脆弱性診断のアイコン
Vulnerability Assessment Icon
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Threat Icon
shield X line icon
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Exposure Icon
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Exploit Icon
Different types of cyber attacks, hacking and malware concepts represented by colorful icons
Young Woman Seeing Herself Worthless, Failure And Smaller Than She Really Are. Low Self-Esteem Concept. Vector Flat Cartoon Illustration. Sad Woman Feeling Low Confidence In Her Abilities.
Cybersecurity Icon Depicting a Hacker Working on a Laptop
Cyber Threat Icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Bug fixing doodle for improve website performance
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Login Password Laptop Composition
Hacker in a mask
vector icon of a document with a shield with a blue background in the shape of a shield
hacker logo. vector. editable.
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Vector light Risk management process diagram schema
Threat Icon
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Breaches Icon
Vulnerability Icon
Vulnerability Icon
Cybercrime skull data breach security threat malware virus attack network vulnerability online risk
 Security Testing Icon for Vulnerability Assessment
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Risk Factor Blue White Icon
Hacked line icon
Cyber scanner Icon
A simulation of melting glaciers and their effects on fresh water supply highlighting the vulnerability of these natural resources in the face of climate change.. Vector illustration
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Insider Threat Icon
emoji icon expressing pleading and vulnerability
Emotional Vulnerability Icon
shield X glyph icon
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Flat vector icon of firewall crossed out with prohibition symbol. Represents disabled firewall, unprotected system, digital vulnerability or cyber warning.
Threat Icon
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
Breaches Icon
Risk Icon
Risk
Cyber security threat on laptop with skull icon representing malware and network vulnerability risk
 Essential Security Testing Icon for Vulnerability Management
Conceptual Illustration of a Young Woman Experiencing Sadness and Isolation
Eye with Tear: A graphic illustration featuring an eye with a teardrop, symbolizing sadness, grief, or emotional release. The artwork captures the essence of vulnerability and empathy.
Risk Factor Outline Icon
Insider Threat Vector Icon. Person silhouette behind a damaged shield, internal security risk, isolated sketch for cybersecurity, data breach prevention, IT
Hand holding fishing rod hooks password box. Represents phishing, digital traps. Ideal for cybersecurity, hacking, online fraud, digital literacy, risk awareness data security. Flat simple metaphor
Tears of Empathy: A simple yet evocative illustration of an eye, conveying themes of emotion, empathy, and vulnerability through a single teardrop.
A woman with a distressed expression surrounded by multiple reaching hands in a flat design style, conveying themes of pressure and emotional struggle in vector illustration
Cybersecurity Risk Icon
Emoji icon prayer request, showing hope and vulnerability
Malware Bug Icon for Cybersecurity Data Privacy Encryption and Protection
Security icon
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Woman holding broken shield symbolizing financial vulnerability
Threat Icon
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
Breaches Icon
Breach Icon
Supply Chain Risk Icon
Cyber security threat hacker attack data breach online safety system security vulnerability network
AI Security Shield: Protecting Artificial Intelligence Systems with Confidence
Smartphone with isometric warning sign alerts user to critical issue
Patch software. Operating system updates that address security vulnerabilities
vulnerability cyber security system illustration lock symbol circuit broken
Zero-Day Exploit Vector Icon. Stopwatch and shield with exclamation mark hit by an arrow, immediate security threat, isolated sketch for cybersecurity, vulnerability, urgent response
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
A woman standing in fear beneath two large hands in a flat, minimal design style vector illustration depicting vulnerability and tension in an abstract environment
Insider Threat Icon
Hacker figure with laptop emitting alert symbol, connected to computers. Adjacent gear and cloud icons suggest cybersecurity, technology, or system vulnerability. Ideal for hacking, data breach
cyber security dual tone icon. Sleek and modern vector icon for websites, mobile apps, marketing materials, and corporate design. Fully scalable and ready to use.
Security Vulnerabilities Outline Color Icon
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Migrant man climbing fence silhouette
Threat Icon
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Set line icons of risk management isolated on white
Vulnerability Icon
Risk icon vector image. Can be used for Compilance and Regulation.
Computer bug detection software security malware analysis vulnerability scanner icon vector design
Hacker Logo Design Illustration
Vulnerability Icon
Patch software web banner or landing page. Operating system updates
malware, cyber attack line vector icon
Hacker use KRACK method for steal important data with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Broken link RGB color icon. Hyperlink that no longer points to its original destination. Error in webpage working process. Isolated vector illustration
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Market Data Icon  in black line style icon, style isolated on white background
Next page
/ 10