Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Website security vulnerability illustration showing software bug detection
Protection background. Technology security, encode and decrypt.
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Penetration Testing icon sheet multi style collection
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Data scientist managing cybersecurity system and network for company cloud infrastructure
Risk Assessment Icon
Flat isometric illustration concept.  security network
Risk icon vector image. Can be used for Compilance and Regulation.
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
3D Isometric Cybersecurity vector icons sets Global Protection Firewall and Data Security
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
Abstract technology security on global network background, vector illustration
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
broken padlock glyph icon
Human factor vulnerability vector
Vulnerability Vector Design
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
vulnerability line icon
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Hacker behind a wall with credit card and computer, surrounded by binary code
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
A continuous line drawing of a heart intertwined with flowing waves, representing love and fluidity in a simple illustration
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Vulnerability Icon
Futuristic dark hexagon honeycomb tech background, red glowing particles for cyber, data, gaming, esports, websites, presentations. Black Hi-tech backgrounds for banners and apps. Vector illustration
Security Vulnerabilities Outline Color Icon
Cybersecurity Evaluation Process. Cyber vulnerability assessment. Professional reviewing system components with checklists and alert icons, careful and
Digital Security and Personal Data Protection Concept.
System Vulnerability Icon
A graphic symbolizing a digital security breach or vulnerability in a protective shield.
Flashing Red Emergency Siren with Yellow Light Rays.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Risk Management web icon set in line style. Risk analysis, risk investment, minimizing losses, plan, low cost, collection. Vector illustration.
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Sign of Meltdown and spectre vulnerability on notebook monitor
Vulnerability Icon
Vulnerability Management and analysis security hacker
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Security Icon
Risk Management Risk Management Bundle H50
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Analytics Icon
Security Holes Blue Icon
wind damage icon sign vector
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Internet Security Isometric Design Concept
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Cyber or web security online service or platform set. Digital data
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
lock With Keyhole on digital data background
Support,Group,Trust,Motivation, multiple style icon set.
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
脆弱性診断のアイコン
Vulnerability Assessment Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Security assessment icon set multiple style collection
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Hacker in a mask
Threat Detection icon set multiple style collection
Frayed rope symbolizes tension and potential breaking point.
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
password leak out and got data breach to hacker
malware flat gradient icon
Protection background. Technology security, encode and decrypt, techno scheme
Ethical hacker set. Character conducting a security penetration test. White
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Human emotions ? sadness and reflection. Character with lowered posture and muted emotion symbols, expressing vulnerability and introspection. Calm, respectful
Certified Ethical Hacker - CEH - icon set & web header banner
risk management asset vulnerability assessment concept
Malware icon with long shadow
Cyber Threat Mitigation icons set multiple style collection. Editable stroke
Cyber scanner Icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Zero Day Multistyle Icon Set
Virus Infected icon in vector. Logotype
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
phone virus hack icon sign vector
Threat Detection Glyph Icon
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Security Testing Icon
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Next page
/ 10