Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Security Vulnerabilities Outline Color Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Malware icon with long shadow
Romantic Embrace - A Couple Surrounded by Hearts Expressing Love.
Cyber or web security online service or platform set. Digital data
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
Analytics Icon
Vulnerability Icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
lock With Keyhole on digital data background
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Penetration Testing icon sheet multi style collection
Security Holes Blue Icon
System Vulnerability Icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
malware flat gradient icon
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
password leak out and got data breach to hacker
Security Risks Icon Style
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Hacker in a mask
Flat isometric illustration concept.  security network
Ethical hacker set. Character conducting a security penetration test. White
Software security vulnerability assessment using robots and professionals
security scan icon sign vector
Blockchain security line icon set. Editable stroke. Vector illustration
Cyber scanner Icon
broken padlock glyph icon
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Weakness Identification icon set multiple style collection
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
phone virus hack icon sign vector
Cloud security vector line icons set. Cloud, security, infrastructure, data, authentication, compliance, encryption illustration outline concept symbols and signs
Exploit Icon
Virus Infected icon in vector. Logotype
Security Testing Icon
Penetration Testing Icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Cybersecurity issue icon
Protection background. Technology security, encode and decrypt.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
malware, cyber attack line vector icon
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Security warning shield indicating a potential threat or vulnerability
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Internet Security Isometric Design Concept
Magnifying glass searching for viruses, malware, software bugs
Risk Icon
Penetration Testing Icon
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Vulnerability Icon
Black bug icon beside dollar coin, signifying financial loss from cybersecurity threats. Ideal for malware risk, cybercrime, software vulnerability, data breach, fraud, hacking, simple flat metaphor
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
spectre and meltdown email spyware virus attack vulnerability vector illustration
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Vulnerability Management and analysis security hacker
脆弱性診断のアイコン
Vulnerability Assessment Icon
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Risk  Icon Set Different Style Collection
vector icon of a document with a shield with a blue background in the shape of a shield
Login Password Laptop Composition
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Risk management line outline icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
unprotected
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Vulnerability Icon
Digital lock protect data flow in global network
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Disruption Multistyle Icon Set
computer cyber security icon sign vector
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Bug Icon
Next page
/ 10