Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Visual representation of software vulnerability detection icon illustration
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
AI technology in security set. Characters using artificial intelligence, algorithms, generative tools for data protection, cybersecurity, privacy, hacking threats prevention. Vector illustration.
security assurance icon sign vector
Cyber Risks Icon Style
Failure Mode Outline Icon
A hand delicately pierces a balloon labeled ego, symbolizing the fragility of self-importance in a serene and minimalistic setting that evokes thought and reflection
Exploit Icon
password fraud icon sign vector
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Cybersecurity consulting service gradient header information consultant professional solution for company information technology cyber security
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Risk Factors Icon
Cyber threat Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Threat Icon
Cyber Threat Icon
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Vulnerability  Icon Set Multiple Style Collection
Security Breach
Honeypot Icon
virus in mail icon sign vector
 Icon of Vulnerability for Security Management
Weakness Outline Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
data and document protection
security antivirus check mark icon sign vector
Ethical hacking involves protection, security, and trust. Key objects, shield, lock, handshake. Outline icons set.
The program offers a safe space for individuals to share their vulnerabilities and receive understanding and validation from their peers.. Vector illustration
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
A flat design depicts various cybersecurity elements illustrating potential ransomware threats and defenses, Ransomware Customizable Flat Illustration
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Threat Icon
System Vulnerability Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple glyph vector
Security Risks Icon Style
Insecure Icon
Exploit Icon
Detection Icon
Broken shield icon Simple thin outline
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple flat vector illustration.
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Risk Icon
Cyber Attack Line Icon Sheet
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
cyber security icon sign vector
Threat Icon
System Vulnerability Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Penetration Testing Icon
Bug Icon – Software Error, Debugging, Malware Detection, IT Security Symbol
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
 Essential Vulnerability Icon for Cybersecurity
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Security Patch icon
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple line vector illustration.
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Security scan Icon
silhouette of a girl and  domestic violence
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
Security Breach
Penetration Testing Icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Risk Flat Icon
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
 risk
Threat Icon
Penetration Testing Icon
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
IT risk glyph icon
computer protection icon sign vector
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
 Icon of Security Patch for Vulnerability Management
A smartphone displays a shield symbol, emphasizing security features designed to protect user data online Phone with security features, illustrated in a flat style.
Security warning shield indicating a potential threat or vulnerability
Risk Icon
Unsecure Vector Design Icon Style
Exploit Icon
Browser Coding Icon Vector Element
Set of 8 "weakness" icons, 1 unexpanded, 1 silhouette - Weakness icon representing fatigue low energy or vulnerability ideal for health n wellness applications
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Penetration Testing Icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Security shield icon.  A graphic representation of protection and safety, symbolizing data security, privacy, and secure access. Ideal for websites, apps, and presentations.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Threat Icon
Supply Chain Risk Icon
Next page
/ 10