Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Bug Bounty Icon with Beetle Design on Transparent Background
Data Breach Icon
Weakness Identification icon set multiple style collection
Risk Icon
Broken chain link icon representing a broken connection or link
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Software Testing Debugging Flat Icons - Red Line Art Style - Checklist Gear Wrench Bug Computer Browser
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Penetration Testing Icon
Flat isometric illustration concept.  security network
Vulnerability Vector Design
Penetration Testing Icon
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Man and woman couple shivering from low temperature at home feeling frozen due to lack of heating
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
lock With Keyhole on digital data background
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Security Icon
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Cybersecurity concept with a hooded hacker typing on a keyboard, surrounded by glowing digital screens displaying code and a prominent padlock icon, symbolizing internet crime and data protection in
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Hacker in a mask
Penetration Testing icon sheet multi style collection
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Weakness Outline Icon
thin line assess icon like review audit risk
Risk  Icon Set Different Style Collection
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Risk icon vector image. Can be used for Compilance and Regulation.
Protection background. Technology security, encode and decrypt.
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
脆弱性診断のアイコン
Vulnerability Assessment Icon
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Isometric cybersecurity icons with warning symbols in vector art
Cybersecurity, DDoS attacks, network vulnerability, internet threats, wireless communication, online safety. wireless symbol, person analyzing data rockets labeled DDoS. Cybersecurity and DDoS
Cybersecurity Icon Set collection with antivirus, password and internet icon
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Black line icon for Vulnerability
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Maintenance smartphone technology search system
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Broken shield icon simple vector isolated symbol
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Threat Assessment Icon
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Software security vulnerability assessment using robots and professionals
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Computer Problem User Composition
A minimal set of 24 solid glyph icons representing cybersecurity, data privacy, and network protection concepts for technology
wind damage icon sign vector
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Analytics Icon
Finger pointing at cyber security lock
Security Icon
Cybersecurity, data sharing, blockchain technology, digital threats, software vulnerability, network integrity. Diagram of a blockchain, trojan horse figure and person with a folder. Cybersecurity
System Vulnerability Icon
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Security assessment icon set multiple style collection
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Threat Detection icon set multiple style collection
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Hearing loss concept. Human ear disease or disability. Deaf person
Risk Management Icon
Login Password Laptop Composition
Cloud security vector line icons set. Cloud, security, infrastructure, data, authentication, compliance, encryption illustration outline concept symbols and signs
Penetration Testing Icon
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Malware icon with long shadow
virus line icon
spectre and meltdown email spyware virus attack vulnerability vector illustration
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Security Testing Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cyber scanner Icon
Broken shield icon vector outline set illustration sign
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Threat Detection Glyph Icon
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Zero Day Multistyle Icon Set
Next page
/ 10