Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Threat Mitigation icon set black and white
Risk assessment process from identification through analysis and evaluation to prioritization and mitigation strategy.
HACCP icon set containing hazard, analysis, critical, control and points vector icons.
A broken wire mesh fence with a large torn hole and bent wires, symbolizing damage, decay, and vulnerability in urban or industrial settings.
3D Isometric Flat Vector Illustration of Mulnerability Testing, Teamwork And Data Management For Cyber Threats With Digital Security Solutions
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Illustrating the process of digital security and software testing for finding errors and vulnerabilities in code
Sql Injection
Laptop icon infected by malware with long shadow on white backgr
Vulnerability  Icon Set Multiple Style Collection
A weak link. Black broken chain. Broken or unleashed black chain like freedom icon. Concept of lost control sign or system vulnerability or security risk. Vector illustration
Cybersecurity and risk management line icon set. Vector pictograms of shield, padlock, fingerprint, and data analysis, thin outline illustration.
Information Technologies Horizontal Banners
Surveillance Analytics Line Blue Icon Set
Cyber attack concept with shield and hacker in dark background
Cybersecurity icons representing data protection cloud server network and personal security concepts vector
Hardening Icon
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
System Vulnerability Icon
Finger pointing at cyber security lock
Cyber Risk icon set black and white
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
CTEM icon set containing scoping, discovery, prioritization, validation and mobilization vector icons
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Vector illustration silhouette of a man with target practice circles on his head and chest, next to a silhouette of a person surrounded by starbursts representing threats or attacks, white
Data breach security attack and hacker fraud problem tiny person concept
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Black and white icon of a database server losing data protection from a cracked security shield
Risk Management Icon Pack with 100 Safety and Assessment Elements - A comprehensive set of 100 cartoon-style risk management icons, featuring warnings, shields, analysis, compliance, and mitigation
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Breach icon sheet multiple style collection
 Journey analytics helps businesses track and analyze customer interactions across multiple touchpoints, providing insights to enhance user experience and boost conversions
Security Audit Multiple Style Icon Design Vector - Security inspection process to identify risks, vulnerabilities, and system weaknesses
The key to safety enhancing cyber security protections
Decryption Icon
security shield icons with padlock symbols in outline and solid black versions isolated on white background.
Penetration Testing Icon
Weakness  Icon Solid Style Vector Illustration
Firewall icon set black and white
computer virus icon sign vector
Vector light Risk management process diagram schema
Couple on house roof during flood, car submerged in rising water
Hacker icon set. A simple vector illustration of a hacker in a hoodie using a laptop with a skull symbol on the screen. vector illustration on white background.
This illustration depicts a robust digital security shield protecting interconnected cloud computing networks, symbolizing data integrity and online privacy.
Green shield with checkmark shatters, symbolizing vulnerability despite security measures in modern digital age, highlighting potential risks and need for constant vigilance.
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Scared child cowers from aggressive fists, symbolizing bullying and fear
A series of four black silhouettes depicting people in various emotional states
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Broken chain link representing weakness and vulnerability in a simple line art drawing
A futuristic glowing blue shield with a fragmented decaying effect
Vector art of a black icon of a broken chain link, symbolizing a severed connection or a point of failure
Security icons illustrating digital protection measures, software vulnerabilities, and data encryption strategies
Silhouette of a man in a cap walking to the edge of a precipice, with a sphere falling off, symbolizing risk and uncertainty.
Decryption Icon
Tiny Boat in Giant Wave Silhouette
Economic Crisis Icon Set Vector Collection Isolated In Black And White
Cyber threat response plan blue onboarding mobile app screen. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI. Montserrat SemiBold, Regular fonts used
Network Defense icon set black and white
Surveillance Analytics Line Black Icon Set
Risk assessment process from identification through analysis and evaluation to prioritization and mitigation strategy.
Phishing concept. Diagram phishing threats linked to cloud and data hosting. Phishing shows risks in data hosting and cybersecurity. For tech security, education, cloud services, IT risks, and online
Broken Shield Icon Illustrates Vulnerability and Shattered Protection.
A damaged chain-link fence with a large, irregular hole representing a void or an escape path
A glowing blue shield with a checkmark symbol representing security and protection
Two people in distress a visual representation of sadness and despair silhouette
Human behavior icon set. Human behavior vector symbol in black filled and outlined style.
Protection and Safety Icon Shield and Broken Bone symbolizing Injury Prevention and Health Security
Cybersecurity data protection shield with padlock for online privacy and network security illustration concept
A silhouette of a young boy with hands clasped appearing to pray or contemplate
Dynamic falling people silhouettes in abstract graphic style with stark black figures on a clean background for motion design.
Cyber warfare concept with military and hacking elements
A sequence depicting a lion walking then injured and hobbling forward
Risk Single Icon Pack Multistyle
Secure Coding Icon
Collection of security icons including shields locks firewalls fingerprints and warnings representing cybersecurity data protection and network safety in a modern design
Aging with Grace: A series of silhouettes depicts the passage of time, showcasing the journey through years. Each figure, with a cane.
Technical support infographic 5 steps. Computer maintenance. Network repair, internet. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used
Security Audit icon set black and white
Cyber Criminal Multiple Style Icon Design Vector - Representation of cybercrime activity involving hacking, digital intrusion, and illegal system access
Risk assessment process from identification through analysis and evaluation to prioritization and mitigation strategy.
Depressed person sitting alone in a dark room under a single light bulb.
Hacker Using Laptop for Cyber Attack Illustration
A doxxing illustration featuring a magnifying glass on a head silhouette, a target on a face, and unlocked padlocks in black and white vector style, suitable for cybersecurity awareness campaigns
Data center server rack engulfed in flames and smoke with damaged cables on floor, concept for system failure illustration, data loss warning and cybersecurity risk awareness
Abstract Geometric Shield with Shattered Effect, Symbolizing Security Breach.
Hand-drawn sandcastle being destroyed by a large crashing ocean wave in a black and white sketch style, a metaphor for failure, fragility, and impermanence
chain, paper clip, office supplies, simple shapes, minimalist, vector graphics, geometric shapes, primary colors chain vector icon
Secure protection shield with lock and arrow for safety and defense
Wheelchair user silhouettes expressing emotion and movement showing disability awareness resilience mental health challenges and inclusive human experience
Three hooded figures working on laptops in a darkened stylized digital illustration
Sequential stick figures depict a human progression from standing upright to a state of profound despair
Risk Study Icon Set Vector Collection Isolated In Black And White
Anonymous figures working on laptops surrounded by digital glitch effects
Threat Icon
Cybersecurity and digital protection line icon set. Vector pictograms of networking, data defense, security lock, and vulnerability, thin linear illustration.
Mobile device security concept with lock and shield icons
Cybersecurity brochure layout. Attack prevention, data management. System protection. Leaflet advertising design with color line icons. Editable 4 pages. Arial-Black, Myriad Pro-Regular fonts used
Next page
/ 10