Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Vulnerability Glyph Icon
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Security Breach Icon
Black line icon for Vulnerability
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Cyber Risk Icon
Zero-Day Exploit icon line vector illustration
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Risk management line outline icon
Code Legacy  Icon Set Multiple Style Collection
Breach Icon
Risk Icon
Security Vulnerabilities Outline Icon
Risk Assessment Icon
lock With Keyhole on digital data background
Cybersecurity vulnerability black glyph icon. System weakness and flaw. Cybercriminal gains access. Errors exploitation. Silhouette symbol on white space. Vector isolated illustration
Design a striking cybersecurity banner featuring a digital lock and shield, emphasizing data protection and online security.
Ocean acidification process.chemical equation and consequences
Intrusion Flat Icon
Tear Drops Turning into Flowers A series of tear drops cascading down and transforming into blooming flowers at the bottom. This represents the idea that expressing vulnerabilities
Magnifying glass is being used to closely examine a computer bug, highlighting the concept of identifying and resolving software vulnerabilities
Solid black icon for Vulnerability
Bug fixing doodle for improve website performance
Computer Problem User Composition
Vulnerability Icon
Protection background. Technology security, encode and decrypt, techno scheme
Certified Ethical Hacker - CEH - icon set & web header banner
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Icono escudo alarma color FB reflejo
Abstract technology security on global network background, vector illustration
Exploit Icon
Risk Icon
Security Vulnerabilities Flat Icon
Risk Assessment Icon
A sad young man with thinning hair and a blue shirt in a minimal flat design vector illustration expressing concern and vulnerability in a simple style
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Ethical hacker. Character conducting a security penetration test. White
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Software Security Blue Icon
Two faces are shown, one is black and the other is white. The faces are broken and cracked, giving the impression of a shattered or fragmented identity. Concept of loss, confusion, and vulnerability
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Simple set of vulnerability related filled icons.
Sicherheitslücke finden
Security Consulting Icon
Vulnerability Management and analysis security hacker
Trust Ladder A ladder where the rungs are made of hearts with a leader helping a team member climb symbolizing how vulnerability helps build a foundation of trust.
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Exploit Icon
Risk Icon
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Security Testing Icon
A distressed man holding a heart symbol in his chest, expressing sadness and emotion in a flat vector illustration, showcasing vulnerability and human feelings in a poignant scene
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Patch software. Operating system updates that address security vulnerabilities
vulnerability cyber security system illustration lock symbol circuit broken
Threat Outline Icon
Vulnerability text with decimal number background
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
脆弱性診断のアイコン
Vulnerability Assessment Icon
Sign of Meltdown and spectre vulnerability on notebook monitor
Open door with heart symbolizes trust and openness.
Security Consulting Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
A bold design emphasizes the word ego with a warning label that reads fragile, inviting viewers to reflect on the nature of self-perception and vulnerability in today's world
Zero Day Icon
Risk Icon
Weakness Identification Outline Icon
Virus Infected icon in vector. Logotype
unprotected
Artistic representations of angels in various poses expressing deep emotions and vulnerability set against a plain background
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Computer security specialist online service or platform. Idea of digital
Software Security Flat Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Person in warm layers huddles on ground against cold. Urban scene shows vulnerability in winter setting. Looking down, expressing hardship. Concept: winter shelter, homeless outreach, cold weather aid
ネットワークセキュリティのイメージイラスト
male vulnerability.
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Threat Mitigation Icon
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Penetration Testing icon vector image. Can be used for Business Audit.
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Vulnerability Vector Design
Zero Day Icon
Risk Icon
Weakness Identification Lineal Blue Icon
Security icons set vector with shadows on white background
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
malware, online scam, virus in computer vector icon
Next page
/ 10