Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Risk management process, business vector concept
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
virus line icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Broken shield icon vector outline set illustration sign
Cybersecurity issue icon
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Data poisoning attack focused on hidden vulnerabilities inside machine learning pipelines. A clear editorial badge showing trusted data sources disrupted by a
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Exploit Icon
Blockchain security line icon set. Editable stroke. Vector illustration
Penetration Testing Icon
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple line vector.
Threat Assessment Icon
Security Scan Icon
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Magnifying glass searching for viruses, malware, software bugs
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Virus on laptop, malware or network vulnerability vector
Isometric cybersecurity icons with warning symbols in vector art
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Hacker activity icon set collection. Simple line vector.
A collection of hacker-themed outline icons, showcasing technology and cybersecurity elements.
malware, cyber attack line vector icon
Login Password Laptop Composition
Risk Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Weakness Identification icon set multiple style collection
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Hearing loss concept. Human ear disease or disability. Deaf person
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Digital Security Shield - Protecting Data with Modern Technology.
Conceptual representation of data security and protection on white background.
Data security concept illustration with shield and connected devices.
Conceptual illustration of data security and information protection processes.
Security icons set featuring alert, warning, threat detection, and anomaly detection symbols
Cyber Crime and Digital Security Minimalist Monoline Geometric Line Art for Network Protection and Data Privacy Interface Design.
spectre and meltdown email spyware virus attack vulnerability vector illustration
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Risk management mind map flowchart business concept for presentations and reports
Honeypot Icon
Abstract technology security  global network background, vector
Broken padlock icon vector. data breach, failed security, cyber vulnerability symbol. vector illustration.
Penetration Testing Icon
Isometric illustration of data security and network protection.
Broken shield icon simple vector isolated symbol
3d padlock inside digital scanning frame. Vulnerability detection, access control verification, cybersecurity monitoring, threat assessment, encryption inspection concept
Weakness Outline Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
vector icon of a document with a shield with a blue background in the shape of a shield
unprotected
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
A person embracing vulnerability, sharing their feelings with a friend. Icon set. Set Logo of A person embracing vulnerability, sharing their feelings with a
Risk management line outline icon
Software security vulnerability assessment using robots and professionals
Graphic illustration of numerous human figures falling or floating in space
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Cybersecurity protection concept with a person working on a computer, shielded from threats by a digital security shield and connected network elements, illustrating data safety and online privacy
Targeted security shield icon: precision protection and vulnerability defense vector
user protection icon sign vector
Online Robbery Icon
Open backdoor in a black wall cybersecurity concept illustration
The key to safety enhancing cyber security protections
Security shield with magnifying glass icon and document with checkmark icon for cybersecurity, verification, and compliance
malware, cyber attack or virus line icon
Analyzing escalating risk over time, depicted with a line graph and critical alert symbol, highlighting potential vulnerabilities and warning signs for proactive business management
Risk Icon
Cyberattack concept: hackers breach computer security, steal data, and spread virus
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Hacked System Broken Padlock Cyber Security Banner
Isometric Cybersecurity and Malware Scanning Concept Illustration for Data Protection and Information Security Audit
A silhouette of a man carrying a woman in his arms against a white background
Terrified person hiding under blue blankets in bed at night
thin line assess icon like review audit risk
Penetration testing vs vulnerability scanning flat style background design.
Flat illustration of man managing cybersecurity for remote work telecommuting security
Risk Blue And White Icon Style Collection
vulnerability search icon. Vector illustration
Vulnerability Icon
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Next page
/ 10