Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Set line icons of risk management isolated on white
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Flat illustration of woman managing IoT security internet of things protection
Security icons set vector with shadows on white background
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Patch software. Operating system updates that address security vulnerabilities
Abstract technology security on global network background, vector illustration
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Certified Ethical Hacker - CEH - icon set & web header banner
Penetration Testing Icon
Cybersecurity Icons Data Protection, Privacy, and Network Security
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cybersecurity solutions linear desktop icons set. Hacking prevention. Bot traffic detection. Pixel perfect 128x128, outline 4px. Isolated user interface elements pack for website. Editable stroke
breach cyber security system concept illustration
Zero Day Multistyle Icon Set
Debug icon symbol collection on white background.
Sicherheitslücke finden
Risk  Outline Icon
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Penetration Testing icon vector image. Can be used for Business Audit.
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Black line icon for Vulnerability
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
Computer security specialist online service or platform. Idea of digital
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Certified Ethical Hacker - CEH - icon set & web header banner
warning on browser icon sign vector
Bug fixing - patch updates for improve performance
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Exploit Icon
Managing Risk for Project Success A Comprehensive Guide and Strategies
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Cyber threat Icon
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Safe mode technology icon in the technological comb bacground
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Mental health issues concept. Flat vector illustration
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
spectre & meltdown processor bugs - cyber security vulnerability
Shield with X icon in trendy flat style. Vulnerability symbol for your web site design, logo, app, UI Vector EPS 10.
Risk Assessment Icon Banner Line Art
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Abstract technology security on global network background, vector illustration
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Security Vulnerabilities Outline Icon
Weaknesses Icon
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Software Testing Debugging Flat Icons - Red Line Art Style - Checklist Gear Wrench Bug Computer Browser
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Risk Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Data Breach Icon
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Risk Management Risk Management Bundle H50
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Penetration Testing Icon
A minimal set of 24 solid glyph icons representing cybersecurity, data privacy, and network protection concepts for technology
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Security Icon
shattered security shield leaking data blocks vector illustration, a security failure, data breach and cybersecurity vulnerability
Abstract technology security on global network background, vector illustration
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Security Icon
AI in Cybersecurity abstract concept vector illustrations.
Cybersecurity concept with a hooded hacker typing on a keyboard, surrounded by glowing digital screens displaying code and a prominent padlock icon, symbolizing internet crime and data protection in
Weakness Outline Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Risk icon vector image. Can be used for Compilance and Regulation.
Risk Assessment Icon
Maintenance smartphone technology search system
Isometric cybersecurity icons with warning symbols in vector art
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Vulnerability Vector Design
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Abstract technology security on global network background, vector illustration
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Next page
/ 10