Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Hacker activity icon set collection. Simple line vector.
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Set of 8 "weakness" icons, 1 unexpanded, 1 silhouette - Weakness icon representing fatigue low energy or vulnerability ideal for health n wellness applications
vulnerability glyph style icon
This vibrant illustration features various elements depicting disproportionate ransomware threats, Customizable illustration of disproportionate ransomware.
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Risk Factor Outline Icon
Cyber threat Icon
Risk Assessment Icon
 Icon of Security Patch for Vulnerability Management
Threat Icon
Exploit Icon
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Failure Mode Glyph Icon
Risk Management Framework icon set in Mixed style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Breach Icon
Vector isometric digital illustration of a cybersecurity concept, highlighting advanced technology, data protection, and network security in a futuristic digital environment.
Information security analyst icons outline key concepts like surveillance, access control, and data protection, transparent background. Outline icons set
Hacking concept
Cloud with Risk and Up Arrow
Threat Intelligence Icon Lineal Blue Style
virus in mail icon sign vector
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Security shield icon.  A graphic representation of protection and safety, symbolizing data security, privacy, and secure access. Ideal for websites, apps, and presentations.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Root Cause Icon Element For Design
Penetration Testing Icon
broken padlock glyph icon
 Vulnerability Icon for Risk Assessment
Threat Icon
Zero Day Icon
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Vulnerability Icon
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Detection Icon
One Line Journey to Authenticity: Unmasking the True Self
A shield with a spine and cracks symbolizes vulnerability and fragility.
Insecure Icon
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
A woman standing in fear beneath two large hands in a flat, minimal design style vector illustration depicting vulnerability and tension in an abstract environment
cyber security icon sign vector
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Secure padlock icon within a shield, symbolizing data protection and online safety.  A simple yet powerful graphic for security-related projects.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Conceptual Illustration of a Young Woman Experiencing Sadness and Isolation
Risk Icon
Cybersecurity Vector Icon Set | data protection, malware, phishing, email threat, firewall, secure server, hacking alert, cloud security, virus warning, encryption, software bug, password lock
 Comprehensive Vulnerability Icon for Protection
Threat Icon
Zero Day Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Zero Day Flat Icon
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Vulnerability Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Ethical hacking involves protection, security, and trust. Key objects, shield, lock, handshake. Outline icons set.
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Risk
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
warning on browser icon sign vector
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
A woman sitting on a bed hugging a pillow while wearing blue pajamas in a flat vector illustration showcasing feelings of contemplation and vulnerability
Cybersecurity vulnerability black glyph icon. System weakness and flaw. Cybercriminal gains access. Errors exploitation. Silhouette symbol on white space. Vector isolated illustration
Ethical hacker abstract concept vector illustration.
Threat icon
Threat Assessment Icon
 Security Testing Icon for Vulnerability Assessment
Threat Icon
Exploit Icon
Emotional Vulnerability Vector Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple flat vector illustration.
vulnerability search icon. Vector illustration
Breach Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Simple set of vulnerability related filled icons.
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
breach cyber security system concept illustration
Certified Ethical Hacker - CEH - icon set & web header banner
Abstract technology security on global network background, vector illustration
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Risk management line outline icon
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Internet Security Isometric Design Concept
Threat Icon
Zero Day Icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
thin line assess icon like review audit risk
Zero Day Glyph Icon
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Vulnerability Icon
Insecure Icon
Next page
/ 10