Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
AI in Cybersecurity abstract concept vector illustrations.
Vulnerability Icon
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
vulnerability
Rocket flying towards five people positioned under thick lines. Ideal for conflict, danger, technology, group vulnerability, war, threat, teamwork. Line metaphor
Insurance icon in drawing style
no protection shield crack icon sign vector
Vector illustration of a person holding their heart, symbolizing vulnerability and emotional expression.
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Crisis. Businessman falls off a cliff. vector
A girl crouching on the ground, appearing sad and overwhelmed by emotions, showcasing vulnerability and introspection in an abstract style
Social Inequality Lineal Color Banner Web Icon Set Vector Illustration, Inequity Exclusion Wealth Prejudice Social Class Hierarchy Fragmentation Education Level
Mutual Support: Look after neighbor's house -modern flat vector concept illustration of man watering plants, looking after neighbors' cat A metaphor of voluntary, collaborative exchanges of services
Supply Chain Risk Icon
Security Holes Blue Icon
Zero Day Exploit Icon
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Failure Vector  Or Logo Sign Symbol Illustration
Detailed Sea Shell Vector Illustration
Risk Factors Icon
Vulnerability Icon
Cyber threat icon vector image. Can be used for Information Security.
Unlocked Padlock
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Risk Assessment Icon Element For Design
Iron chain concept with a fracture in the middle, emphasizing broken links. Ideal for themes like vulnerability, failure, freedom, structural integrity, and liberation. Realistic, simple, detailed
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Server rack is standing near a broken shield, representing data loss and security breach
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
vulnerability
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Penetration Testing Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Zero Day Exploit Icon
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
ネットワークセキュリティのイメージイラスト
Failure Blue Icon
Detailed Sea Shell Vector Illustration with lineart
Woman frightened from anxiety and mental health disorder. Cartoon illustration
Vulnerability Icon
Vulnerability Icon
Flat isometric illustration concept.  security network
broken padlock glyph icon
脆弱性診断のアイコン
Vulnerability Assessment Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Password Cracking Icon
Data Leak Vector Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Mutual Support: Book Swap -modern flat vector concept illustration of a woman leaving books on a shelf in hallway for neighbors A metaphor of voluntary, collaborative exchanges of resource, services
System Vulnerability Icon
Security Vulnerabilities Flat Icon
Zero Day Exploit Icon
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Failure Outline Color Icon
Emotions of people. Fear
Vulnerability in the Wall: A Strength Unveiled
Self-Harm Icon
Threat Assessment Icon
Ethical hacker abstract concept vector illustration.
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
SQL Injection Icon
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Virus Infected icon in vector. Logotype
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Security Breach Icon
System Vulnerability Icon
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Zero Day Exploit Icon
VPN shield icon representing secure global connectivity, globe with network lines, and digital wallet with fly representing security vulnerabilities. Ideal for internet security, online banking
Ethical hacker. Character conducting a security penetration test. White
Failure Flat Icon
malware flat gradient icon
Detailed Sea Shell Vector Illustration with outline
Hopelessness Icon
Security Testing vector icon illustration of Quality Assurance iconset.
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
A computer protected by a shield on top, symbolizing online data security, Online data security restoration, Simple and minimalist flat Vector Illustration
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Risk icon vector image. Can be used for Compilance and Regulation.
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Outline neon lock picking icon set. Glowing neon broken lock with danger warning, destroyed digital protection. Security hacking, cyber attack guard, hacked protection of private data. Vector icons
Security Breach Icon
Security Patch Flat Icon Design
Illustration of a broken chain link symbolizing weakness or vulnerability.
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Supply Chain Risk Icon
Security Vulnerabilities Blue Icon
Zero Day Exploit Icon
Computer programming icon set with building, hardware, computing, cpu, usability, efficiency, analysis, designing, function, software, development, prototyping, decomposition, source code, engineering
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Cybercrime. Flat Vector Illustration
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Next page
/ 10