Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Hacker activity icon set collection. Simple line vector.
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Risk Assessment Icon
Penetration Testing icon sheet multi style collection
Data scientist managing cybersecurity system and network for company cloud infrastructure
Risk icon vector image. Can be used for Compilance and Regulation.
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Flat isometric illustration concept.  security network
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
Abstract technology security on global network background, vector illustration
Human factor vulnerability vector
Vulnerability Vector Design
Security Vulnerabilities Outline Color Icon
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Futuristic dark hexagon honeycomb tech background, red glowing particles for cyber, data, gaming, esports, websites, presentations. Black Hi-tech backgrounds for banners and apps. Vector illustration
Cybersecurity Evaluation Process. Cyber vulnerability assessment. Professional reviewing system components with checklists and alert icons, careful and
Digital Security and Personal Data Protection Concept.
broken padlock glyph icon
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Sign of Meltdown and spectre vulnerability on notebook monitor
Security Holes Blue Icon
wind damage icon sign vector
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Vulnerability Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Risk Management Risk Management Bundle H50
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Analytics Icon
Four black padlocks with one broken and cracking open
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
A minimal set of 24 solid glyph icons representing cybersecurity, data privacy, and network protection concepts for technology
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Cyber or web security online service or platform set. Digital data
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
lock With Keyhole on digital data background
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
vulnerability line icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Weakness Identification icon set multiple style collection
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
System Vulnerability Icon
Vulnerability Icon
Flashing Red Emergency Siren with Yellow Light Rays.
Hacker in a mask
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Frayed rope symbolizes tension and potential breaking point.
Risk Management web icon set in line style. Risk analysis, risk investment, minimizing losses, plan, low cost, collection. Vector illustration.
Vulnerability Management and analysis security hacker
Security Icon
malware flat gradient icon
password leak out and got data breach to hacker
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Ethical hacker set. Character conducting a security penetration test. White
Malware icon with long shadow
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Human emotions ? sadness and reflection. Character with lowered posture and muted emotion symbols, expressing vulnerability and introspection. Calm, respectful
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
脆弱性診断のアイコン
Vulnerability Assessment Icon
Cyber scanner Icon
Zero Day Multistyle Icon Set
Virus Infected icon in vector. Logotype
phone virus hack icon sign vector
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Security Testing Icon
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Security scan flat line icon set. Security scan Thin line illustration vector
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Threat Detection icon set multiple style collection
Cybersecurity issue icon
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Blockchain security line icon set. Editable stroke. Vector illustration
Protection background. Technology security, encode and decrypt.
Security Scan Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Penetration Testing Icon
Exploit Icon
Next page
/ 10