Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
 Vulnerability Icon for Risk Assessment
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Penetration Testing Icon
Risk
Zero Day Icon
Failure Mode Glyph Icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Risk Icon
Cyber threat Icon
Penetration Testing Icon
Ethical hacker. Character conducting a security penetration test. White
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Insider Threat Icon
Cybersecurity consulting service gradient header information consultant professional solution for company information technology cyber security
Threat Icon
Risk Factor Outline Icon
AI in Cybersecurity abstract concept vector illustrations.
Exploit Icon
 Essential Vulnerability Icon for Cybersecurity
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Programmer at work. Computer assisted design, developer testing program.
Zero Day Icon
Weakness Outline Icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Detection Icon
Risk Icon
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Flat illustration of man managing cybersecurity for remote work telecommuting security
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Security icons set vector with shadows on white background
Vulnerability Icon
Threat Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
 Vulnerability Scanner Technology Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Risk Icon
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Zero Day Icon
Failure Mode Outline Icon
Risk icon vector image. Can be used for Compilance and Regulation.
Vulnerability Icon
Exploit Icon
Cyber threat Icon
Market Data Icon  in black line style icon, style isolated on white background
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Risk Factors Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Threat Icon
Insider Threat Icon
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Risk Assessment Icon
Cyber Threat Icon
Mental health issues concept. Flat vector illustration
Abstract technology security on global network background, vector illustration
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Exploit Icon
Failure Mode Flat Icon
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Security vector illustration word cloud isolated on a white background.
Threat Icon
Vulnerability Icon
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Emotional Vulnerability Vector Icon
Hacked line icon
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Threat Icon
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Risk Factor Blue White Icon
VULNERABILITY
Exploit Icon
Vulnerability Icon
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Emotional Vulnerability Vector Icon
Security Testing Icon
 Stylish Vulnerability Scanner Icon
Analytics Icon
Threat Icon
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Next page
/ 10