Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Ethical Hacking Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Devsecops Icon
warning on browser icon sign vector
Cyber Attack Line Icon Sheet
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Zero Day Icon
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Cyber Threat Icon
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple flat vector illustration.
broken padlock glyph icon
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Exploit Icon
Threat Assessment Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Failure Outline Color Icon
security antivirus check mark icon sign vector
Risk icon vector image. Can be used for Compilance and Regulation.
Programmer at work. Computer assisted design, developer testing program.
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Devsecops Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Vulnerability Assessment vector icon style
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Exploit Icon
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
System Vulnerability Icon
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple line vector illustration.
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Security warning shield indicating a potential threat or vulnerability
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
website bug concept. errors, problems, defects or gaps contained in the website. illustration of a browser window, website symbol, and insect. symbol or icon. minimalist 3d style design. graphic
Security Breach Icon
breach line icon
Failure Vector  Or Logo Sign Symbol Illustration
AI in Cybersecurity abstract concept vector illustrations.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Vulnerability Icon
Security Breach
Risk Factors Icon
A hand delicately pierces a balloon labeled ego, symbolizing the fragility of self-importance in a serene and minimalistic setting that evokes thought and reflection
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
computer protection icon sign vector
Flat illustration of man managing cybersecurity for remote work telecommuting security
Zero Day Icon
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Penetration Testing Icon
Internet services icon collection set. Containing server web, features, higher support, authentication mechanisms, anonymous, basic access, digest icon. Simple flat vector.
Black and white icon of a database server losing data protection from a cracked security shield
Mental health issues concept. Flat vector illustration
Escape from business crisis, recession or risk, adversity or challenge to survive danger, uncertainty or vulnerability, run away from trapped, hopeless concept, businessman escape from danger wave.
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Security Breach Icon
virus line icon
Failure Outline Icon
Encircling Care: A Single-Line Embrace of Vulnerability
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
1049 - Risk Concept Illustration
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Sicherheitslücke finden
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Vulnerability Icon
Vulnerability Management and analysis security hacker
Supply Chain Risk Icon
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Minimalist Trojan Horse Icon, Blue and Green Tones, Cybersecurity Concept
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Open Source Icon
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Failure Vector  Or Logo Sign Symbol Illustration
Vulnerability search. SEO optimization,web analytics, programmin
Neon half tone shield representing vulnerability in digital world with glowing lines
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Virus Infected icon in vector. Logotype
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Next page
/ 10