Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Visual representation of software vulnerability detection icon illustration
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Weakness Outline Icon
Security warning shield indicating a potential threat or vulnerability
data and document protection
Honeypot Icon
Penetration Testing Icon
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
AI technology in security set. Characters using artificial intelligence, algorithms, generative tools for data protection, cybersecurity, privacy, hacking threats prevention. Vector illustration.
Risk Factors Icon
Risk Icon
silhouette of a girl and  domestic violence
Security Risks Icon Style
Cyber threat Icon
vulnerability line icon
Threat Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Security Breach
Cyber Attack Line Icon Sheet
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Failure Mode Outline Icon
Vulnerability  Icon Set Multiple Style Collection
A comprehensive set of icons illustrating various aspects of cyber attacks, including threats, defenses, and security measures.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
System Vulnerability Icon
cyber security icon sign vector
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
The program offers a safe space for individuals to share their vulnerabilities and receive understanding and validation from their peers.. Vector illustration
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple glyph vector
IT risk glyph icon
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Threat Icon
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Security Breach
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
A smartphone displays a shield symbol, emphasizing security features designed to protect user data online Phone with security features, illustrated in a flat style.
Cyber Risks Icon Style
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Broken shield icon Simple thin outline
Detection Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
System Vulnerability Icon
security antivirus check mark icon sign vector
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple flat vector illustration.
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
A hand delicately pierces a balloon labeled ego, symbolizing the fragility of self-importance in a serene and minimalistic setting that evokes thought and reflection
Risk Flat Icon
virus in mail icon sign vector
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Exploit Icon
Threat Icon
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Penetration Testing Icon
Penetration Testing Icon
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Exploit Icon
Security Patch icon
password fraud icon sign vector
Security scan Icon
 Icon of Vulnerability for Security Management
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Sad depressed woman in despair and grief mood, sitting curled up, hugging knees. Frustrated desperate upset female, overwhelmed by sorrow. Flat vector illustration isolated on white background
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Supply Chain Risk Icon
security assurance icon sign vector
Cybersecurity consulting service gradient header information consultant professional solution for company information technology cyber security
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Threat Icon
Bug Icon – Software Error, Debugging, Malware Detection, IT Security Symbol
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
 risk
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Penetration Testing Icon
Insecure Icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
computer protection icon sign vector
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Vulnerability Assessment Icon
Set of 8 "weakness" icons, 1 unexpanded, 1 silhouette - Weakness icon representing fatigue low energy or vulnerability ideal for health n wellness applications
 Essential Vulnerability Icon for Cybersecurity
Vulnerability Icon
Threat Icon
A shield with a spine and cracks symbolizes vulnerability and fragility.
Failure Mode Blue Icon
Security Vulnerability Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Exploit Icon
Threat Icon
Next page
/ 10