Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Weakness Identification icon set multiple style collection
Human factor vulnerability vector
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Vulnerability Vector Design
Risk Icon
Computer security specialist online service or platform. Idea of digital
Penetration Testing Icon
Threat Detection icon sheet multi style collection
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
lock With Keyhole on digital data background
Penetration Testing Icon
Futuristic dark hexagon honeycomb tech background, red glowing particles for cyber, data, gaming, esports, websites, presentations. Black Hi-tech backgrounds for banners and apps. Vector illustration
Security Icon
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Hacker in a mask
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Cybersecurity Evaluation Process. Cyber vulnerability assessment. Professional reviewing system components with checklists and alert icons, careful and
Flat isometric illustration concept.  security network
A programmer or IT specialist analyzes a database, finding a critical error, threat, or system vulnerability with a magnifying glass
Sign of Meltdown and spectre vulnerability on notebook monitor
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Cybersecurity Team Protecting Data Center Servers with Shield and Padlock, Network Security and Privacy Protection, Secure Database, IT Infrastructure Defense Flat Vector Illustration
Risk icon sheet multiple style collection
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Hacker behind a wall with credit card and computer, surrounded by binary code
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Hacker activity icon set collection. Simple line vector.
Set of Antivirus line icon. Includes thin line symbols protect, privacy, tech, defense, hacker and more. Line icons with editable stroke. Cyber icon. Vector illustration.
Website security vulnerability illustration showing software bug detection
thin line assess icon like review audit risk
Data scientist managing cybersecurity system and network for company cloud infrastructure
Risk  Icon Set Different Style Collection
Risk icon vector image. Can be used for Compilance and Regulation.
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Protection background. Technology security, encode and decrypt.
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
脆弱性診断のアイコン
Vulnerability Assessment Icon
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Black line icon for Vulnerability
A hacker focused on a computer surrounded by silhouettes within a network
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Threat Assessment Icon
Cybersecurity Icon Set collection with antivirus, password and internet icon
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
virus line icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Digital Security and Personal Data Protection Concept.
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Human emotions ? sadness and reflection. Character with lowered posture and muted emotion symbols, expressing vulnerability and introspection. Calm, respectful
Login Password Laptop Composition
vulnerability line icon
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Finger pointing at cyber security lock
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
System Vulnerability Icon
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
wind damage icon sign vector
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Analytics Icon
Four black padlocks with one broken and cracking open
A minimal set of 24 solid glyph icons representing cybersecurity, data privacy, and network protection concepts for technology
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Computer Problem User Composition
Virus on laptop, malware or network vulnerability vector
Blockchain security line icon set. Editable stroke. Vector illustration
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Penetration Testing icon sheet multi style collection
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Frayed rope symbolizes tension and potential breaking point.
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Malware icon with long shadow
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Next page
/ 10