Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Weakness Icon Set With Multiple Style Collection
A flat style illustration showing data breach
Cyber threat icon vector image. Can be used for Information Security.
Risk Icon
Anonymous hacker in a hoodie using a laptop surrounded by digital security icons and data
脆弱性診断のアイコン
Vulnerability Assessment Icon
Zero Day Icon
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Penetration Testing Icon
Cybersecurity Icon Set collection with antivirus, password and internet icon
Collection of security icons representing various aspects of online safety and data protection
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
unprotected
Risk Icon
Vulnerability Management and analysis security hacker
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Vulnerability Assessment Multiple Style Icon Set Vector
Exposure Icon
Cyber threat Icon
Solid black icon for Vulnerability
A flat style illustration showing data theft
Cyber threat icon vector image. Can be used for Information Security.
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Exploit Icon
Silhouette of a hacker holding and using a laptop while standing
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
unsecure icon
computer cyber security icon sign vector
Risk Icon
Risk management line outline icon
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Hacker in hoodie at laptop computer. Cybercrime, internet fraud, and phishing concept. Man coding malware for data theft. Cybersecurity vulnerability and dark web vector illustration.
Security Vulnerabilities Outline Color Icon
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
A flat style illustration showing password cracking
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
shield X line icon
Data Leak Icon
Exploit Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Risk Icon
Threat Assessment Icon
phone virus hack icon sign vector
Risk Icon
 risk
The Information Security flat icon set highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
Shield vulnerability detection icon vector sign
Disruption Icon
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
Risk Assessment Icon Element For Design
A young child sits injured after a bicycle accident, while 4–5 other children continue cycling in the background, symbolizing the vulnerability of hemophilia.
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Man in despair covering face vector silhouette
A flat style illustration showing security breach
Risk Factor icon vector image. Can be used for Privacy.
A cracked shield symbolizes vulnerability and exposed weakness.
Penetration Testing Icon
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Black line icon for Vulnerability
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Patch software. Operating system updates that address security vulnerabilities
vulnerability glyph style icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Exploit Icon
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Risk Icon
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Programmer at work. Computer assisted design, developer testing program.
Risk
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Vulnerability Icon
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Vulnerability Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Risk Assessment Icon
Shield with a small crack and light shining through, symbolizing strength with vulnerability in muted tones and minimal detail on transparent background
Security Holes Blue Icon
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Exploit Icon
Cyber Security Icon
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Risk Icon
Penetration Testing Icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Next page
/ 10