Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Zero Day Exploit Icon
breach line icon
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Risk icon vector image. Can be used for Compilance and Regulation.
Unbreakable Heart: Resilience and Recovery in One Line
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Virus Infected icon in vector. Logotype
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cartoon vector illustration of a woman sitting in hands
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
Man Connecting to Wi-Fi Network with Padlock Encryption, Wireless Security and Password Protection Concept
Vulnerability Assessment vector icon style
Risk icon
Penetration Testing Icon
Escape from business crisis, recession or risk, adversity or challenge to survive danger, uncertainty or vulnerability, run away from trapped, hopeless concept, businessman escape from danger wave.
Ethical Hacking Icon
Ethical hacker. Character conducting a security penetration test. White
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Data Leak icon vector image. Can be used for Compilance and Regulation.
Password Cracking Icon
earthquake disaster icon sign vector
Emotions of people. Fear
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Vulnerability Icon
Malware bug target icon. Simple outline style. Network vulnerability, virus, malware, ransomware, fraud, spam, phishing, scam, hacker attack, IT security concept. Thin line symbol. Editable stroke.
vulnerability glyph style icon
Ethical Hacking Icon
Supply chain problems. Businessmen connect chains together vector
Risk Factors Icon
Vulnerability Assessment vector icon style
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
System Vulnerability Icon
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Zero Day Exploit Icon
Risk management line outline icon
Domestic violence bullying cartoon vector concepts. Harassment frightened woman avatar face wrists hand silhouettes vulnerability rape sexual invade, pressure crime violation personal boundaries
A blue shield with a crack and a star, symbolizing vulnerability and protection.
Password Cracking icon line vector illustration
Vulnerability Icon
cyber security icon sign vector
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
脆弱性診断のアイコン
Vulnerability Assessment Icon
Cyber scanner icon vector image. Can be used for Information Security.
data and document protection
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Man Connecting to Wi-Fi Network with Padlock Encryption, Wireless Security and Password Protection Concept
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Open Source Icon
malware flat gradient icon
Risk Assessment Icon
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Ethical Hacking Icon
Security Vulnerabilities Blue Icon
SQL Injection Icon
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Flat isometric illustration concept.  security network
Password Cracking Icon
password fishing icon sign vector
Risk Assessment Icon Element For Design
Iron chain concept with a fracture in the middle, emphasizing broken links. Ideal for themes like vulnerability, failure, freedom, structural integrity, and liberation. Realistic, simple, detailed
security antivirus check mark icon sign vector
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Vulnerability in the Wall: A Strength Unveiled
Mutual Support: Assistance in parking the car -modern flat vector concept illustration of man assisting woman with parallel parking A metaphor of voluntary collaborative exchanges of resource, service
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
protected cloud data
Digital Trojan Horse Concept for Cybersecurity Awareness
Broken Shield line icon
Supply Chain Risk Icon
Security  Icon
Zero Day Exploit Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
A businessman sits on the floor with a box on his head, depicting failure and disappointment.
Password Cracking Icon
broken hearth icon sign vector
World Tsunami Awareness Day
Weakness Vector Line Icon Design
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Abstract technology concept background. Vector Illustration. EPS 10. Technology background.
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Mutual Support: Look after neighbor's house -modern flat vector concept illustration of man watering plants, looking after neighbors' cat A metaphor of voluntary, collaborative exchanges of services
An examination of binary code by a magnifying glass symbolizes a vulnerability assessment in cybersecurity.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Social Inequality Line Banner Web Icon Set Vector Illustration, Inequity Exclusion Wealth Prejudice Social Class Hierarchy Fragmentation Education Level
Overcoming Economic Crisis and Business Troubles in 2024, Protecting and Preventing from Financial Challenges
Bug fixing doodle for improve website performance
Cyber Threat Icon
password leak out and got data breach to hacker
Next page
/ 10