Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Hacker behind a wall with credit card and computer, surrounded by binary code
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Vulnerability Management and analysis security hacker
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Hacker activity icon set collection. Simple line vector.
AI in Cybersecurity abstract concept vector illustrations.
broken padlock glyph icon
Trust and vulnerability in love. A calm editorial scene of two people standing close, gently sharing a quiet moment, with subtle heart and
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Risk icon vector image. Can be used for Compilance and Regulation.
Risk Assessment Icon
vulnerability line icon
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
Abstract technology security on global network background, vector illustration
Software Testing Debugging Flat Icons - Red Line Art Style - Checklist Gear Wrench Bug Computer Browser
Vulnerability Vector Design
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Security Vulnerabilities Outline Color Icon
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Vulnerability Icon
System Vulnerability Icon
Risk Management Risk Management Bundle H50
wind damage icon sign vector
Vulnerability Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Security Holes Blue Icon
Analytics Icon
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
A minimal set of 24 solid glyph icons representing cybersecurity, data privacy, and network protection concepts for technology
Cyber or web security online service or platform set. Digital data
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Security scan flat line icon set. Security scan Thin line illustration vector
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
lock With Keyhole on digital data background
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Security assessment icon set multiple style collection
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Computer Programing icon collection set. Containing performing, cpu, computing, integration, testing, analysis, generating, algorithms, hardware and debugging icon. Simple flat vector.
脆弱性診断のアイコン
Vulnerability Assessment Icon
Protection background. Technology security, encode and decrypt, techno scheme
Hacker in a mask
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Certified Ethical Hacker - CEH - icon set & web header banner
Threat Detection Glyph Icon
Cyber Crime Attack. Cyber Security Alert With Glowing Unlock Icon In Red Protective Sphere, Digital Cybersecurity Warning Banner For Online Safety, Futuristic Tech Threat Concept, Vector Illustration
Cybersecurity Line Icons Editable Stroke: Protection, Security, and Data Safety
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
virus line icon
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
password leak out and got data breach to hacker
Risk Icon
Security Testing Icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Ethical hacker set. Character conducting a security penetration test. White
malware flat gradient icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Weakness Identification icon set multiple style collection
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Mitigation Plan Icon Collection and Simple Concept Outline Color, Containing: Climate Change,Green Environment,Evacuation Plan,Ecology,Reduction,Notification,Community,Task List,Disaster Recovery
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Cyber scanner Icon
phone virus hack icon sign vector
Threat Assessment Icon
Zero Day Multistyle Icon Set
Virus Infected icon in vector. Logotype
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Malware icon with long shadow
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Broken shield icon vector outline set illustration sign
set of distressed black padlock icons symbolizing security and vulnerability in access control
vulnerability flower, bold style black Hand drawn set collection , white background , vector isolate
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Next page
/ 10