Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Cybersecurity Risk icon vector image. Can be used for Risk Management.
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Vulnerability text with decimal number background
Computer screen with skull symbol warning security vulnerability alert
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Businessman betrayed walking defeated arrows in back. Corporate backstabbing workplace betrayal metaphor. Business trust violation attack vulnerability concept backstab hurt
Broken chain link with shield icon symbolizes security breach or vulnerability
Computer Problem User Composition
ネットワークセキュリティのイメージイラスト
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Ethical Hacking Icon
Penetration Testing Icon
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Collection of digital security and cyber threat icons representing modern technology risks and hacking defense mechanisms
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
Crime scene on a laptop
Ethical hacker. Character conducting a security penetration test. White
Threat Icon
Security Breach Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Data Breach Alert: The screen displays a stark warning of a data breach, symbolizing the digital vulnerability and the risks associated with cyber threats.
Cybersecurity Defense Against Digital Threats: A Firewall Shielding Business Professionals from Malware and Virus Attacks.
Data breach and information leakage after cyber attack tiny person concept, transparent background. Hacking threat and privacy danger after connection vulnerability illustration.
Internet Security Isometric Design Concept
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Penetration Testing Icon
Flat illustration of man managing cybersecurity for remote work telecommuting security
Vulnerability glyph color icon
Penetration Testing icon vector image. Can be used for Business Audit.
Security Vulnerabilities Outline Icon
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Penetration Testing Icon
Risk Icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Isometric flat vector icons of Cyber Defense Systems: honeypot decoy server, digital breach simulator, perimeter security layer, vulnerability scanner tool, security event log viewer, breach
Data Breach
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Protection background. Technology security, encode and decrypt, techno scheme
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Certified Ethical Hacker - CEH - icon set & web header banner
lock With Keyhole on digital data background
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Penetration Testing Icon
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Vulnerability Icon
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Sign of Meltdown and spectre vulnerability on notebook monitor
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Cybersecurity vulnerability concept. Shocked woman, broken padlock illustrating data breach, hacked account, password compromise. Internet security failure, online privacy risk, identity theft alert.
Icons of Openness. Outline icon set of vulnerability and authenticity: open heart, mask removal, tear drop, fingerprint, mirror
Vector illustration of a coder on an open padlock with code tags, symbolizing open-source software security, programming vulnerabilities, and technology access control concept.
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Vulnerability Assessment Icon
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Vulnerability
Security Vulnerabilities Flat Icon
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
vulnerability vector outline icon on white or transparent background
Mobile phone data breach vulnerability represented as fishing hook
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Two silhouetted hands with fingers spread, symbolizing openness and vulnerability
Penetration Testing Icon
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Vector artwork of the word "Anxiety" shattered like glass, symbolizing mental tension, fear, and emotional instability.
vulnerability woman mirror fear vector
Bug fixing - patch updates for improve performance
Cybersecurity vulnerability illustration. Data breach concept. Stressed woman, broken padlock. Hacking, system failure, online threat. Password compromised. Information security risk. Privacy.
cybersecurity data protection icon sign vector
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Abstract technology security on global network background, vector illustration
Vulnerability Assessment Icon
Mental Health Awareness: A stark graphic illustrates the complexities of mental health challenges, symbolized by an iceberg, with the visible tip representing awareness.
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Security Vulnerabilities Blue Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Self-Esteem Icon
Worm or larva icon, commonly representing a computer worm (malware), a software bug, or a system vulnerability that needs to be addressed quickly.
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Penetration Testing Icon
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Identity management blue gradient concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Myriad Pro-Bold font used
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Vector lettering of the word "Trust" shattered like broken glass, symbolizing betrayal, lost faith, and emotional damage.
Flat illustration of woman managing IoT security internet of things protection
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Next page
/ 10