Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Browser with Unlocked Padlock Icon Representing Unsecured Connection and Data Vulnerability
vulnerability
shatter vector illustration
Cyber Risks Icon Style
Broken shield icon set. Vector line icons for security, vulnerability, and risk. Unsafe protection, defense failure, and data breach concept. Cybersecurity warning alert symbol.
Cybersecurity silhouette icon set. featuring phishing, malware, hacker, warning, shield, and spam symbols.
set of padlock icons in a minimalist line style. featuring locked and unlocked padlocks, security shield, key access, fingerprint authentication, digital security, and broken padlock. editable strokes
Segmentation Icon
Securing Digital Identity Role: User Access Governance In Cybersecurity Management
Code Legacy  Icon Set Multiple Style Collection
handicap
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
Vulnerability Scanner Icon
Weak link. Broken chain or weakness concept. Broken or unleashed black chain like freedom icon. concept of lost control sign or system vulnerability or security risk. Vector illustration
A cracked shield symbolizes vulnerability and exposed weakness.
Disruption Icon
Bug fixing doodle for improve website performance
Threats Icon
word cloud - malvertising
The key to safety enhancing cyber security protections
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
vulnerability
Trojan horse on wheels, hoodie-clad hacker with alert on laptop, lightbulb with gear. Ideal for cybersecurity, hacking risks, malware, data protection, innovation, software vulnerabilities simple
Security vector illustration word cloud isolated on a white background.
Cyber Security Icon Set Colour Style with cyber security, authentication, authorization, ransomware, antivirus, internet security, bomb, settings, data base and control
Broken shield icon black and white vector sign
Compliance Icon
Patch Icon
Superhero businessman protecting data with shield and padlock from cyber attack
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
email with virus, phishing vector icon
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
A Cyber security engineer monitoring the system for vulnerabilities to protect data
Vulnerability Line Two Color Icon
Insecure Icon
Stylized representation of emotional distress with a fractured heart, symbolizing separation and vulnerability
Vulnerability Icon
Cloud with Risk and Up Arrow
Cybercrime and Data Breach Alert: A Menacing Hacker Celebrating a Successful Cyber Attack, Represented by an Unsecured Lock, Stolen Documents, Credit Card Theft, and the Spread of Computer Viruses.
The key to safety enhancing cyber security protections
Inside the space suit a network of intricate wiring and circuitry allows the wearer to control the suits movements with precision. Where
vulnerability
Shield with binary code juxtaposed against bug icon representing cybersecurity and software vulnerabilities. Ideal for security, protection, hacking, coding, technology, IT, and risk concepts. Simple
network global security icon with shield
Sql Injection
Laptop icon infected by malware with long shadow on white backgr
Ethical Hacking Icon
Escalation Icon
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Abstract symbols linear icons set
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Vulnerability Scanner Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Trustworthy and honesty to believe in work together, integrity or trust for partnership, support and reliable to help success together concept, businessman acrobat hold hand tight by trusted partner.
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Black and white icon of a database server losing data protection from a cracked security shield
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
The key to safety enhancing cyber security protections
Abstract technology security on global network background, vector illustration
Bug Icon – Software Error, Debugging, Malware Detection, IT Security Symbol
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
Patch software web banner or landing page. Operating system updates
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Information security line vector icons and signs. Security, Protection, Cyber, Access, System, Policy, Data, Network outline vector illustration set
*Stamp11
Patching Icon
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Virus on laptop, malware or network vulnerability vector
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Compliance Icon
Detailed Sea Shell Vector Illustration
Disruption Icon
Vector light Risk management process diagram schema
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
The key to safety enhancing cyber security protections
Risk management linear icons set. Probability, Uncertainty, Mitigation, Contingency, Hazards, Vulnerability, Security line vector and concept signs. Resilience,Exposure,Loss outline Generative AI
Security Risks Icon Style
Programmer at work. Computer assisted design, developer testing program.
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Information Technologies Horizontal Banners
Security Breach Icon
傷ついた盾のシンプルなイラスト
Vulnerability Icon
Weakness Icon Set Vector illustration in black
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline concept vector illustrations
Cyber Threat Icon
Security Holes Glyph Icon
Cyber threat Icon
Compliance Icon
Vulnerability Multistyle Icon Set
Flat illustration of man managing cybersecurity for remote work telecommuting security
malware, online scam, virus in computer vector icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Risk Icon
The key to safety enhancing cyber security protections
Next page
/ 10