Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Browser with Unlocked Padlock Icon Representing Unsecured Connection and Data Vulnerability
vulnerability
shatter vector illustration
Cyber Risks Icon Style
Broken shield icon set. Vector line icons for security, vulnerability, and risk. Unsafe protection, defense failure, and data breach concept. Cybersecurity warning alert symbol.
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
set of padlock icons in a minimalist line style. featuring locked and unlocked padlocks, security shield, key access, fingerprint authentication, digital security, and broken padlock. editable strokes
Securing Digital Identity Role: User Access Governance In Cybersecurity Management
Code Legacy  Icon Set Multiple Style Collection
Segmentation Icon
handicap
Vulnerability Scanner Icon
Weak link. Broken chain or weakness concept. Broken or unleashed black chain like freedom icon. concept of lost control sign or system vulnerability or security risk. Vector illustration
A cracked shield symbolizes vulnerability and exposed weakness.
Disruption Icon
Bug fixing doodle for improve website performance
Threats Icon
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
word cloud - malvertising
The key to safety enhancing cyber security protections
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
vulnerability
Cyber Security Icon Set Colour Style with cyber security, authentication, authorization, ransomware, antivirus, internet security, bomb, settings, data base and control
Trojan horse on wheels, hoodie-clad hacker with alert on laptop, lightbulb with gear. Ideal for cybersecurity, hacking risks, malware, data protection, innovation, software vulnerabilities simple
Security vector illustration word cloud isolated on a white background.
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Broken shield icon black and white vector sign
Compliance Icon
Patch Icon
Superhero businessman protecting data with shield and padlock from cyber attack
Vulnerability Line Two Color Icon
email with virus, phishing vector icon
A Cyber security engineer monitoring the system for vulnerabilities to protect data
Inside the space suit a network of intricate wiring and circuitry allows the wearer to control the suits movements with precision. Where
Insecure Icon
Stylized representation of emotional distress with a fractured heart, symbolizing separation and vulnerability
Vulnerability Icon
Cloud with Risk and Up Arrow
The key to safety enhancing cyber security protections
Cybercrime and Data Breach Alert: A Menacing Hacker Celebrating a Successful Cyber Attack, Represented by an Unsecured Lock, Stolen Documents, Credit Card Theft, and the Spread of Computer Viruses.
vulnerability
network global security icon with shield
Shield with binary code juxtaposed against bug icon representing cybersecurity and software vulnerabilities. Ideal for security, protection, hacking, coding, technology, IT, and risk concepts. Simple
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Sql Injection
Abstract symbols linear icons set
Laptop icon infected by malware with long shadow on white backgr
Ethical Hacking Icon
Escalation Icon
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Vulnerability Scanner Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Trustworthy and honesty to believe in work together, integrity or trust for partnership, support and reliable to help success together concept, businessman acrobat hold hand tight by trusted partner.
Black and white icon of a database server losing data protection from a cracked security shield
Vector light Risk management process diagram schema
Abstract technology security on global network background, vector illustration
The key to safety enhancing cyber security protections
Bug Icon – Software Error, Debugging, Malware Detection, IT Security Symbol
Patch software web banner or landing page. Operating system updates
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
Information security line vector icons and signs. Security, Protection, Cyber, Access, System, Policy, Data, Network outline vector illustration set
*Stamp11
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Information Technologies Horizontal Banners
Cyber Threat Icon
Patching Icon
Disruption Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Compliance Icon
Detailed Sea Shell Vector Illustration
Risk management linear icons set. Probability, Uncertainty, Mitigation, Contingency, Hazards, Vulnerability, Security line vector and concept signs. Resilience,Exposure,Loss outline Generative AI
Virus on laptop, malware or network vulnerability vector
傷ついた盾のシンプルなイラスト
The key to safety enhancing cyber security protections
Security Risks Icon Style
Programmer at work. Computer assisted design, developer testing program.
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Security Breach Icon
Cyber threat Icon
Weakness Icon Set Vector illustration in black
Vulnerability Icon
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline concept vector illustrations
Security Holes Glyph Icon
Vulnerability Multistyle Icon Set
Flat illustration of man managing cybersecurity for remote work telecommuting security
Compliance Icon
malware, online scam, virus in computer vector icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Risk Icon
Secure digital identity management and data protection.
Digital lock protect data flow in global network
Next page
/ 10