Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Threat Assessment Icon
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Virus on laptop, malware or network vulnerability vector
Futuristic dark hexagon honeycomb tech background, red glowing particles for cyber, data, gaming, esports, websites, presentations. Black Hi-tech backgrounds for banners and apps. Vector illustration
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Open Vulnerability Icon
Broken shield icon symbolizing vulnerability and security concerns
Complex network diagram illustrating interconnected nodes and potential vulnerabilities Vector
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Icons showing a secure shield with a checkmark and a broken shield representing vulnerability status
malware flat gradient icon
Cybersecurity Professionals Working Together to Protect Digital Information.
Conceptual illustration of data protection and cybersecurity processes.
Frayed rope symbolizes tension and potential breaking point.
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Set of broken shield with lightning bolt icons representing security breach data protection failure and danger useful for cybersecurity warnings alert systems error messages
trust and vulnerability seamless pattern, couples holding hands, exchanging messages, hearts, flowers and speech bubbles arranged in a repeating pattern, white
Broken gate symbolizing vulnerability and unauthorized access shown as a simple fence with one panel tilted open and a small warning triangle nearby,
Isometric Cybersecurity Network with Shield and Servers.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
password leak out and got data breach to hacker
Silhouette of a Sad Woman Sitting Alone on a Chair in a Bright Room
Ethical hacker set. Character conducting a security penetration test. White
Two Men Collaborating on Data Security and Cloud Computing Concepts.
risk management asset vulnerability assessment concept
Data Breach Icon Set Multiple Style Collection
Cyber Threat Mitigation icons set multiple style collection. Editable stroke
Contrasting padlocks symbolizing security and vulnerability with cracked designs
Cyber scanner Icon
Virus Infected icon in vector. Logotype
Broken padlock icon vector. data breach, failed security, cyber vulnerability symbol. vector illustration.
Zero Day Multistyle Icon Set
Vulnerability insights and real-time threat monitoring icons with vulnerability
Risk management process, business vector concept
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Cybersecurity Team Protecting Data Center Servers with Shield and Padlock, Network Security and Privacy Protection, Secure Database, IT Infrastructure Defense Flat Vector Illustration
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Security Testing Icon
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
A teal shield with a white padlock icon representing digital security
Broken shield icon vector outline set illustration sign
Data Breach Icon Set Multiple Style Collection
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple line vector.
Sharp thorns symbolize pain, struggle, and sacrifice against a clean background
padlock Gradient icon
Cybersecurity issue icon
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Exploit Icon
Data poisoning attack focused on hidden vulnerabilities inside machine learning pipelines. A clear editorial badge showing trusted data sources disrupted by a
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Blockchain security line icon set. Editable stroke. Vector illustration
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Security Scan Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Magnifying glass searching for viruses, malware, software bugs
Penetration Testing Icon
Isometric cybersecurity icons with warning symbols in vector art
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Vulnerability Icon Set Multiple Style Collection
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Weakness Identification icon set multiple style collection
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
A collection of hacker-themed outline icons, showcasing technology and cybersecurity elements.
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
malware, cyber attack line vector icon
Vector graphic illustration of evaluate and vulnerability management concepts with checklist and shield icons
Login Password Laptop Composition
Risk Icon
Computer screen displaying vulnerability scan with magnifying glass.
Isometric icons depict secure smart contract auditing and formal verification, showcasing code vulnerability scans and security patch deployment systems.
vulnerability assessment icon
Hearing loss concept. Human ear disease or disability. Deaf person
Digital Security System - Shielding Data with Advanced Protection and Encryption.
Shielded Website Security Icon with Connected Data Elements.
Antivirus software searching for viruses, malwares and vulnerabilities.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
spectre & meltdown processor bugs - cyber security vulnerability
Abstract technology security on global network background, vector illustration
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Risk management mind map flowchart business concept for presentations and reports
Young people helping erderly at the bus stop. Blind man with guide dog, old woman with a cane, elderly man in a wheelchair. Social helping concept. Vector illustration.
Penetration Testing Icon
Isometric illustration of data security and network protection.
Broken shield icon simple vector isolated symbol
A comprehensive infographic illustrating various aspects of cyber security, including data encryption, network monitoring, firewall servers, secure cloud, authentication, and hacker threats.
Security icons set vector with shadows on white background
Honeypot Icon
Print
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
System administrator online service or platform set. Technical work with server
Abstract technology security  global network background, vector
Next page
/ 10