Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Vulnerability Icon
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept.flat characters.
threat, risk, vulnerability, computer security, cyber security, trouble, warning, alert solid or glyph icon
Virus Infected icon in vector. Logotype
Cyber Crime Icons Pack,Breach Black Fill Icon
Crisis. Businessman falls off a cliff. vector
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Failure Vector  Or Logo Sign Symbol Illustration
Abstract technology security on global network background, vector illustration
Penetration Testing Icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Security Testing vector icon illustration of Quality Assurance iconset.
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Vulnerability Management and analysis security hacker
vulnerability
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Zero Day Exploit Icon
Social Inequality Lineal Color Banner Web Icon Set Vector Illustration, Inequity Exclusion Wealth Prejudice Social Class Hierarchy Fragmentation Education Level
Flat illustration of woman developing secure software with security shield and programming code
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Vulnerability Icon
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Outline neon lock picking icon set. Glowing neon broken lock with danger warning, destroyed digital protection. Security hacking, cyber attack guard, hacked protection of private data. Vector icons
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Cyber Crime Icons Pack,Gear and Padlock Cracks Black Fill Icon
Security Breach Icon
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Failure Outline Color Icon
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Penetration Testing Icon
malware flat gradient icon
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Broken computer screen. Cracked monitor display, signifying system failure or data loss.  Represents vulnerability and fragility.
computer protection icon sign vector
vulnerability
ネットワークセキュリティのイメージイラスト
Zero Day Exploit Icon
vulnerability glyph style icon
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Supply chain problems. Businessmen connect chains together vector
Hopelessness Icon
Illustration of a broken chain link symbolizing weakness or vulnerability.
脆弱性診断のアイコン
Vulnerability Assessment Icon
Cyber threat icon vector image. Can be used for Information Security.
Cyber Crime Icons Pack,Breach Filled Line Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Cybersecurity vulnerability black glyph icon. System weakness and flaw. Cybercriminal gains access. Errors exploitation. Silhouette symbol on white space. Vector isolated illustration
Failure Blue Icon
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Supply Chain Risk Icon
Mutual Support: Book Swap -modern flat vector concept illustration of a woman leaving books on a shelf in hallway for neighbors A metaphor of voluntary, collaborative exchanges of resource, services
Insurance icon in drawing style
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
AI in Cybersecurity abstract concept vector illustrations.
broken padlock glyph icon
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Zero Day Exploit Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Flat isometric illustration concept.  security network
Hopelessness Icon
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Risk icon vector image. Can be used for Compilance and Regulation.
Cyber Crime Icons Pack,Computer Bug Flat Icon
SQL Injection Icon
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Failure Glyph Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
System Vulnerability Icon
Mutual Support: Look after neighbor's house -modern flat vector concept illustration of man watering plants, looking after neighbors' cat A metaphor of voluntary, collaborative exchanges of services
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Money scam icon in drawing style
Social Inequality Line Banner Web Icon Set Vector Illustration, Inequity Exclusion Wealth Prejudice Social Class Hierarchy Fragmentation Education Level
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Risk Assessment Icon Element For Design
Zero Day Exploit Icon
Ethical hacker abstract concept vector illustration.
Ethical hacker. Character conducting a security penetration test. White
Vulnerability in the Wall: A Strength Unveiled
Vulnerability Icon
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Cartoon vector illustration of a woman sitting on the floor, crying with her knees bent, symbolizing sadness, emotional pain, and vulnerability
Penetration Testing icon vector image. Can be used for Business Audit.
Cyber Crime Icons Pack,Gear and Padlock Cracks Flat Icon
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Failure Outline Icon
Security Vulnerabilities Blue Icon
Supply Chain Risk Icon
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
A computer protected by a shield on top, symbolizing online data security, Online data security restoration, Simple and minimalist flat Vector Illustration
Security Patch Flat Icon Design
Threat Assessment Icon
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Zero Day Exploit Icon
Rocket flying towards five people positioned under thick lines. Ideal for conflict, danger, technology, group vulnerability, war, threat, teamwork. Line metaphor
Next page
/ 10