Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
A security shield with an exclamation point, symbolizing vulnerability.
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
System Vulnerability Icon
Protection background. Technology security, encode and decrypt, techno scheme
A sleek black and white vector icon depicting a wine glass with a visible crack  symbolizing breakage or damage. Perfect for designs related to fragility  accidents  loss  or vulnerability
Abstract technology security  global network background, vector
Cybersecurity intelligence line icons collection. Threats, Breaches, Hacks, Malware, Vulnerabilities, Pentesting, Encryption vector and linear illustration. Firewalls,Intrusion,Phishing outline signs
Print
Certified Ethical Hacker - CEH - icon set & web header banner
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
A diverse group of people running for their lives to escape a catastrophic tsunami wave, an illustration of survival and emergency evacuation.
Threat Assessment Icon
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Protección de las personas mayores o tercera edad.
Incident Multistyle Icon Set
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Network Security Icon
Understanding Cybersecurity Principles and Practices for Digital Protection and Risk Management
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Business IT Security Concept Design, Mesh of Connected Network Client Nodes
Supply Chain Risk Icon
Finger pointing at cyber security lock
Threat Mitigation Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Vulnerability search. SEO optimization,web analytics, programmin
Social volunteering or social care concept. With three illustrations of social workers helping elderly and disabled people. Flat vector illustration
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Digital illustration depicting a polar bear standing on a fragment of melting ice.  The ice is cracked and shows water underneath. In the background, an offshore oil rig is visible. The style is
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Cybersecurity bug protection shield with circuit background for virus malware and threat detection system
Root Cause Icon Element For Design
Protection background. Technology security, encode and decrypt, techno scheme
Exploit Multistyle Icon Set
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Data breach security attack and hacker fraud problem tiny person concept
Secure Coding Icon
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Failure Mode Outline Icon
Vulnerability text with decimal number background
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Vulnerability Icons
ID badge next to a bug under a cloud represents digital identity, cybersecurity threats, and data protection issues. Ideal for IT, tech safety, risk management, digital ID, software vulnerabilities
Sign of Meltdown and spectre vulnerability on notebook monitor
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
computer virus icon sign vector
Risk Assessment Icon Element For Design
Vulnerability Icon
Cybersecurity threat detection vulnerability attack defense security eye bomb warning data analysis vector art illustration and png
Flat illustration of man performing penetration testing ethical hacking and improving security
Disempowerment Icon Pack Multistyle Illustration
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Broken shield icon vector outline set illustration sign
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Illustration of a broken chain link symbolizing weakness or vulnerability.
Exploit Icon
user protection icon sign vector
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Cyber scanner Icon
The key to safety enhancing cyber security protections
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Risk Management Icon
Homelessness  icon .  Vector for websites, mobile interfaces, presentations, banner, visual branding etc. Vector illustration. isolated on white and black background. EPS 10
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Exploit software tool. Software bug or vulnerability break out. Cyber
A blue cloud with a shield and servers connected by arrows representing secure data transfer network
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
A superhero character guarding a secure folder containing a document, symbolizing data protection.
Vulnerability  Icon Set Multiple Style Collection
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Hardening Icon
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
Tiny Boat in Giant Wave Silhouette
virus line icon
Vulnerability  Icon Set Multiple Style Collection
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple line vector.
Market Data Icon  in black line style icon, style isolated on white background
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Simple set of vulnerability related filled icons.
Security Breach Icon
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Hardening Icon
Decryption Icon
Exploit Icon
Next page
/ 10