Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Weakness Outline Icon
Risk Vector Design Icon Style
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
 risk
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Security Breach
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Exploit Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
user protection icon sign vector
Detection Icon
Website bug detection software security vulnerability testing and malware analysis tool
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
Risk  Outline Icon
Insecure Icon
Vulnerability Icon
Devsecops Solid Icon Vector Illustration
Open Source Icon Set With Multiple Style Collection
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
Zero Day Blue Icon
Threat Icon
Cyber scanner Icon
Hacker activity icon set collection. Simple line color vector.
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Penetration Testing Icon
Risk Management Icon
Zero Day Icon
Risk Icon Outline Style. Vector Illustration For Graphic Design
Cybersecurity Risk Icon
phone virus hack icon sign vector
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Tiny Boat in Giant Wave Silhouette
Cybersecurity Icons Data Protection, Privacy, and Network Security
Insecure Icon
Vulnerability Assessment Icon
Devsecops Lineal Icon Vector Illustration
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Failure Mode Outline Icon
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Penetration Testing Icon
Hacker activity icon set collection. Simple line vector.
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Risk Icon
Risk Icon
A man holding a red heart in his hands with a concerned expression in a flat vector illustration depicting emotional vulnerability and introspection
Insider Threat Icon
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Cybersecurity Risk Icon
Threat Icon
Insecure Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Devsecops
Cyber Security Icon
Risk icon vector image. Can be used for Compilance and Regulation.
Failure Mode Flat Icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Penetration Testing Icon
Broken shield icon Simple thin outline
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Unsecure Vector Design Icon Style
warning on browser icon sign vector
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Insider Threat Icon
vulnerability line icon
Risk Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
broken padlock glyph icon
Hazard Icon Outline Style. Vector Illustration For Graphic Design
Risk Icon
Penetration Testing Icon
Devsecops Fill Icon Vector Illusrtation
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Emotional Vulnerability Vector Icon
Risk Glyph Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Cyber threat Icon
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Exploit Icon
Vulnerability Icon
Cybersecurity Risk Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
 Vulnerability Icon for Risk Assessment
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Security feedback or security audit feedback, vulnerability assessment or security review, risk evaluation or threat analysis, system performance feedback or security effectiveness review, penetration
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Risk Icon
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Next page
/ 10