Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Protecting Digital Assets Data Security and Privacy Management Overview
Risk Management Hazard Line Editable Icons set. Vector illustration in thin line modern style of warning, danger, security, protection. Editable stroke. Vector illustration
Recognizing elder abuse, physical, psychological, economic, and environmental signs
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Risk Icon
Online Robbery Line Gradient Circle Background Icon
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Risk Management Risk Management Bundle H50
vulnerability line icon
Zero Day Icon
Configuration Vulnerability Assesement
Broken padlock on a laptop screen representing data vulnerability and hacking
Security Audit Icon
Website bug detection software security vulnerability testing and malware analysis tool
Patch Management Icon Lineal Syle
Conceptual illustration of a hacker stealing data from a database while navigating a digital environment with security symbols hiding among tech icons
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
System Vulnerability Icon
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Create a striking icon depicting a hooded figure, shrouded in shadow, hunched over a laptop, subtly suggesting hacking activity.
Penetration Testing Icon
Zero Day Icon
A flat style illustration depicting system breach
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Weakness Outline Icon
Risk  Outline Icon
Illustration of a cyber attack: damaged shield on computer, surrounded by warnings, crossed documents, and a broken lock.
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Penetration Testing Icon
Data Breach Icon
Code Legacy  Icon Set Multiple Style Collection
Cybersecurity Risk Icon
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Cybersecurity breach concept. Hacker stealing confidential data. Cybercrime and internet security threat illustration. Data theft, phishing, malware attack. Information privacy violation.
Security shield with exclamation mark warning icon
Silhouette of a dead bird lying on its back with raised legs, tragic consequences of bird poaching, environmental destruction, need for urgent conservation efforts to protect animal species,extinction
Zero Day Icon
A flat style illustration showing code injection
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Cyber Threat Icon
CyberSafe Shield Digital Security, Data Protection, Privacy
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Hacker activity icon set collection. Simple line vector.
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Risk Icon
Application security practices infographic 5 steps. Threat management, access control. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used
 risk
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
security specialist holding shield deflecting cyber attacks from multiple devices, vector illustration for firewall protection, network intrusion prevention, cybersecurity defense and data breach
Configuration Vulnerability Assesement
Illustration of a hacker engaged in cyber attack, highlighting id card blocking and censorship in the digital landscape
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Emotional Vector Illustration of Sad Lonely Teenager Girl Sitting Alone with Knees Pulled to Chest, Minimalist Depression and Anxiety Concept for Mental Health Awareness, Youth Psychology Graphic
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
Vulnerability Multiple Style Icon Set Vector
Data Protection Securing Your Business Information with Cloud Technology and Robust Security Measures
Exploit Icon
Risk icon vector image. Can be used for Compilance and Regulation.
Security Testing Icon
Zero Day Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
 risk
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Shield with Bug Warning Icon, Cyber Security Symbol on Transparent Background
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Cybersecurity Icons Data Protection, Privacy, and Network Security
Security icon
Hacker activity icon set collection. Simple line color vector.
A flat style illustration showing data breach
Collection of security icons representing various aspects of online safety and data protection
Blockchain security icon set. Containing as cryptography, encryption, decentralization, consensus, hash function and more. Vector illustration
Pleading Face Emoji
Cyber scanner Icon
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Breach Icon
Data breach concept. Hacker stealing confidential information, personal data. Cybercrime. Identity theft. Phishing. Cybersecurity. Thief with data sack. Email. Password. Security risk. Privacy.
Zero Day Icon
Security scan icons set in black filled and stroke line style
Phishing scam hacker attack concept showing a digital environment with hackers targeting users through deceptive techniques
Hacker stealing confidential data from a computer. Cybersecurity breach, data leak, and information theft concept. Cybercrime, internet privacy violation, security vulnerability, and phishing.
Exploit Icon
Risk Assessment Icon Set Multiple Style Collection
phone virus hack icon sign vector
Vulnerability Flat Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
vulnerability cyber security system illustration lock symbol circuit broken
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Hacker activity icon set collection. Simple color fill vector.
A flat style illustration showing data theft
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Penetration Testing Icon
Next page
/ 10