Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
website bug concept. errors, problems, defects or gaps contained in the website. illustration of a browser window, website symbol, and insect. symbol or icon. minimalist 3d style design. graphic
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Zero Day Icon
A hand delicately pierces a balloon labeled ego, symbolizing the fragility of self-importance in a serene and minimalistic setting that evokes thought and reflection
Penetration Testing Icon
Security Breach Icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cyber Attack Line Icon Sheet
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Vulnerability Icon
Failure Outline Icon
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Internet services icon collection set. Containing server web, features, higher support, authentication mechanisms, anonymous, basic access, digest icon. Simple flat vector.
breach line icon
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
warning on browser icon sign vector
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Vulnerability Assessment vector icon style
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
Risk Factors Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Exploit Icon
Root Cause Icon Element For Design
Supply Chain Risk Icon
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Exploit Icon
computer protection icon sign vector
AI in Cybersecurity abstract concept vector illustrations.
Threat Assessment Icon
Failure Vector  Or Logo Sign Symbol Illustration
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Risk icon vector image. Can be used for Compilance and Regulation.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Black and white icon of a database server losing data protection from a cracked security shield
Ethical Hacking Icon
Social Inequality Line Banner Web Icon Set Vector Illustration, Inequity Exclusion Wealth Prejudice Social Class Hierarchy Fragmentation Education Level
Security Breach
Devsecops Icon
Open Source Icon
Zero Day Icon
Escape from business crisis, recession or risk, adversity or challenge to survive danger, uncertainty or vulnerability, run away from trapped, hopeless concept, businessman escape from danger wave.
Supply Chain Risk Icon
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Flat illustration of data security expert inspecting security logs with alert notifications popping up
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
security antivirus check mark icon sign vector
Mental health issues concept. Flat vector illustration
Vulnerability Icon
Failure Flat Icon
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple line vector illustration.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Encircling Care: A Single-Line Embrace of Vulnerability
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Security warning shield indicating a potential threat or vulnerability
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Devsecops Icon
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Exploit Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
System Vulnerability Icon
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Flat illustration of woman managing IoT security internet of things protection
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Sicherheitslücke finden
Vulnerability Management and analysis security hacker
vulnerability cyber security system illustration lock symbol circuit broken
Failure vector  or logo sign symbol illustration
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple flat vector illustration.
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Data Breach glyph icon
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Minimalist Trojan Horse Icon, Blue and Green Tones, Cybersecurity Concept
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Zero Day Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Penetration Testing Icon
spectre & meltdown processor bugs - cyber security vulnerability
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Next page
/ 10