Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Threat Detection Glyph Icon
Penetration Testing Icon
Exploit Icon
Certified Ethical Hacker - CEH - icon set & web header banner
malware, cyber attack line vector icon
Magnifying glass searching for viruses, malware, software bugs
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Cybersecurity concept with digital data servers shield and padlock icon vector illustration
Protection background. Technology security, encode and decrypt.
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Virus on laptop, malware or network vulnerability vector
virus line icon
Security Testing Icon
Isometric cybersecurity icons with warning symbols in vector art
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
A collection of hacker-themed outline icons, showcasing technology and cybersecurity elements.
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple line vector.
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Login Password Laptop Composition
Risk Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Threat Assessment Icon
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Hearing loss concept. Human ear disease or disability. Deaf person
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
spectre and meltdown email spyware virus attack vulnerability vector illustration
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Abstract technology security  global network background, vector
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Penetration Testing Icon
Broken shield icon simple vector isolated symbol
A protective symbol depicting a fetus cradled within two hands representing care and life
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Weakness Outline Icon
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Internet Security Isometric Design Concept
Honeypot Icon
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
vector icon of a document with a shield with a blue background in the shape of a shield
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
unprotected
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Risk management line outline icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Software security vulnerability assessment using robots and professionals
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
user protection icon sign vector
Vulnerability Icon
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Cloud computing concept with a user icon and lightning bolt, representing fast data transfer, powerful online services, or security vulnerabilities.
Striking visual of a fractured black hexagon symbolizing damage or vulnerability
Icons for vulnerability spotter, encrypted logic portal, and defense beam, representing cybersecurity, data protection, and digital security systems.
Burning brick wall cyber attack
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Magnifying Glass Inspecting Warning Sign Risk Analysis Icon
malware, cyber attack or virus line icon
Analyzing escalating risk over time, depicted with a line graph and critical alert symbol, highlighting potential vulnerabilities and warning signs for proactive business management
DDoS attack concept. Depiction of DDoS with missiles targeting a timer broad cybersecurity threats. DDoS attacks demonstrate vulnerabilities in online services. For cybersecurity campaigns, digital
Risk Icon
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Terrified person hiding under blue blankets in bed at night
Person peeking from behind a sad theatrical mask
Cybersecurity icons: password cracker, network scanner, ddos, malware, firewall bypass
Risk Blue And White Icon Style Collection
vulnerability search icon. Vector illustration
Computer software debugging concept showing magnifying glass inspecting website on laptop to find and fix security vulnerabilities.
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
computer cyber security icon sign vector
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Three anime-style vector illustrations of a blindfolded woman in a black swimsuit and yellow raincoat, kneeling with head bowed, on a blue background, depicting vulnerability or contemplation.
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Inner emotional crack depicted by a seated figure with subtle fissures in the silhouette, tiny floating shards and stars suggesting vulnerability, reflection,
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
人物
Vulnerability text with decimal number background
*Stamp11
Cybersecurity crisis with businessman being monitored by invisible hacker through computer system vulnerability representing data breach risk and privacy violation in modern digital office environment
Hooded figure breaking through a digital firewall, representing a cyber attack, data breach, and security vulnerability
Crime scene on a laptop
Melancholy expression in stark black and white, showcasing vulnerability and inner turmoil
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Cybersecurity, DDoS attacks, network vulnerability, internet threats, wireless communication, online safety. wireless symbol, person analyzing data rockets labeled DDoS. Cybersecurity and DDoS
Set of vulnerability icon collection in multiple style. Icon suitable for web and mobile application
Risk Assessment Icon
Digital Security Shield on Futuristic Circuit Board.
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Cloud security vector line icons set. Cloud, security, infrastructure, data, authentication, compliance, encryption illustration outline concept symbols and signs
Next page
/ 10