Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Penetration Testing Icon
Ethical hacker. Character conducting a security penetration test. White
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
Website audit or digital compliance check, performance analysis or speed testing, security scan or vulnerability assessment, user experience or interface evaluation, mobile responsiveness
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Risk Icon
Security Vulnerabilities Blue Icon
Businessman betrayed walking defeated arrows in back. Corporate backstabbing workplace betrayal metaphor. Business trust violation attack vulnerability concept backstab hurt
Abstract symbols linear icons set
Broken chain link with shield icon symbolizes security breach or vulnerability
A distressed bunny rabbit, sporting bandages, with a hidden knife subtly positioned behind its back.  Depict a sense of vulnerability and hidden danger.
Ethical Hacking Icon
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Security Breach Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Penetration Testing Icon
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Vector illustration of secure software development life cycle showing code audit, vulnerability testing, and signed deployment
Flat illustration of man managing cybersecurity for remote work telecommuting security
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Security Vulnerabilities Flat Icon
Data breach and information leakage after cyber attack tiny person concept, transparent background. Hacking threat and privacy danger after connection vulnerability illustration.
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Cybersecurity Defense Against Digital Threats: A Firewall Shielding Business Professionals from Malware and Virus Attacks.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Penetration Testing icon vector image. Can be used for Business Audit.
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Threat Icon
System administrator online service or platform. Technical work with server
Collection of digital security and cyber threat icons representing modern technology risks and hacking defense mechanisms
Data Breach
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Penetration Testing Icon
Internet Security Isometric Design Concept
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Crime scene on a laptop
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Security Vulnerabilities Outline Icon
Isometric flat vector icons of Cyber Defense Systems: honeypot decoy server, digital breach simulator, perimeter security layer, vulnerability scanner tool, security event log viewer, breach
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Illustration of open mouth with inner lip cut, exploring vulnerability
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Protection background. Technology security, encode and decrypt, techno scheme
Certified Ethical Hacker - CEH - icon set & web header banner
lock With Keyhole on digital data background
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Sign of Meltdown and spectre vulnerability on notebook monitor
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Cybersecurity vulnerability illustration. Data breach concept. Stressed woman, broken padlock. Hacking, system failure, online threat. Password compromised. Information security risk. Privacy.
Penetration Testing Icon
Icons of Openness. Outline icon set of vulnerability and authenticity: open heart, mask removal, tear drop, fingerprint, mirror
patch update solid
ネットワークセキュリティのイメージイラスト
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Computer Problem User Composition
Bridges of Connection Two figures standing on opposite sides of a gap connecting with a glowing bridge made of hearts. This illustrates how vulnerability can bridge emotional
Two silhouetted hands with fingers spread, symbolizing openness and vulnerability
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Illustration of open mouth with inner lip cut, exploring vulnerability
vulnerability vector outline icon on white or transparent background
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Vector artwork of the word "Anxiety" shattered like glass, symbolizing mental tension, fear, and emotional instability.
Self-Esteem Icon
Malware icon with long shadow
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Bitcoin wallet virus concept cryptocurrency security breach digital finance cyber attack blockchain vulnerability one
cybersecurity data protection icon sign vector
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Penetration Testing Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
patch update dual tone
Mobile phone data breach vulnerability represented as fishing hook
Mental Health Awareness: A stark graphic illustrates the complexities of mental health challenges, symbolized by an iceberg, with the visible tip representing awareness.
vulnerability cyber security system illustration lock symbol circuit broken
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Vulnerability Icon
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Vulnerability glyph color icon
Sicherheitslücke finden
Flat illustration of woman managing IoT security internet of things protection
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Vector lettering of the word "Trust" shattered like broken glass, symbolizing betrayal, lost faith, and emotional damage.
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Software quality assurance, cybersecurity firewall, system, software icon
Abstract technology security on global network background, vector illustration
Security icons set vector with shadows on white background
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Next page
/ 10