Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Risk Management Risk Management Bundle H50
Risk Icon
 risk
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Cyber crime and hacker attack concept demonstrating hackers stealing sensitive data using technology in a digital environment
A flat illustration showing an insecure privacy alert with security icons on a computer display Privacy alert is insecure, flat illustration
Risk Icon
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Risk Assessment Icon Set Multiple Style Collection
Bullet hole with radiating cracks radiating outwards against black background. Hole in shattered glass with cracks. Glass surface broken. Effect for gaming or warning visuals. Vector image..
Weakness Outline Icon
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Website bug detection software security vulnerability testing and malware analysis tool
Security scan icons set in black filled and stroke line style
Zero Day Icon
Risk Factor Icon Pack Multistyle Illustration
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Mobile phone hijacking or hacking vector allert illustration concept for business and technology
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Cyber scanner Icon
Data Leak Icon
Cloud bug detected - vector icon
Emotional Burden: A solitary figure embodies the weight of inner struggles, the artistic rendering of vulnerability and introspection.
Cyber security breach concept. Hacker stealing confidential information and personal data. Computer crime, malware, phishing attack, and digital privacy risk. Network security alert.
Security icons illustrating digital protection measures, software vulnerabilities, and data encryption strategies
Risk Icon
Breach Icon
Bug Alert
shield X line icon
Environmental hazard and safety icons for infographic design
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Man Hugging His Reflection in the Mirror – Concept of Self-Love and Acceptance. Hand drawn style vector design illustrations.
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Zero Day Icon
This poignant image depicts a thoughtful person with a tear, reflecting emotions of sadness and contemplation, an evocative capture of vulnerability and human experience.
Broken padlock on a laptop screen representing data vulnerability and hacking
Padlock over binary code signifying data security and a bug representing malware threat. Ideal for cybersecurity, hacking, data protection, software vulnerability, coding, encryption, simple flat
Risk  Outline Icon
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Understanding the threat of malicious software and its impact on digital security
Zero Day Multistyle Icon Set
Shield vulnerability detection icon vector sign
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Risk Icon Set With Multiple Style Collection
Cybersecurity Risk Icon
Risk Icon
Password Vulnerability
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Risk icon vector image. Can be used for Compilance and Regulation.
Empathy's Embrace: A poignant illustration portraying support and solace, where a friend offers comforting gestures to another. Capturing a tender moment of shared vulnerability and compassion.
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Cybersecurity Concept Showing Data Breach Through Monitor And Spyware
Hacker attack on computer. Cyber security threat, data phishing concept. Anonymous criminal stealing login and password information. Internet privacy breach vector.
Exploit Icon
Flat illustration of three people placing warning cones around server security perimeter to prevent cyber threats with encrypted barriers
Collection of security icons representing various aspects of online safety and data protection
Shield with binary code juxtaposed against bug icon representing cybersecurity and software vulnerabilities. Ideal for security, protection, hacking, coding, technology, IT, and risk concepts. Simple
Cybersecurity and privacy thin line icons set data protection and network security
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Data Breach Icon
Vulnerability Outline Icon
Security shield with exclamation mark warning icon
Cybersecurity concept warning on hacker laptop
Weakness Icon Set With Multiple Style Collection
computer network malware icon sign vector
Cybersecurity Risk Icon
Hacker activity icon set collection. Simple line color vector.
Server racks connected to cloud storage with security shield and lock symbol representing data protection in isometric line contour vector illustration
Security Testing icon vector image. Can be used for Quality Assurance.
Configuration Vulnerability Assesement
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Securing Digital Assets Cloud Data Protection and Cybersecurity
Security Audit Icon
Exploit Icon
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Risk Icon
Depiction of a man expressing intense emotion with liquid dripping down his face and neck against a dark background
Sad Young Woman's Portrait: A cute young girl with expressive large eyes stands with her hands behind her back, exuding vulnerability and a touch of sadness.
Security Breach Icon
Patch Management Icon Lineal Syle
Threats Icon
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Risk Management Risk Management Bundle H25 V02
Disempowerment Icon Pack Multistyle Illustration
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Cybersecurity concept warning on hacker laptop
Cyber threat icon vector image. Can be used for Information Security.
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Security Audit multiple icon
vulnerability line icon
Cyber threat Icon
security scan icon sign vector
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Next page
/ 10