Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Hacker in a mask
Bug Bounty Icon with Beetle Design on Transparent Background
broken padlock glyph icon
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Debug icon symbol collection on white background.
Risk Icon
An illustration of a woman hesitantly holding a smiling mask, with a speech bubble that represents mental confusion, highlighting the brave act of admitting that it's okay not to be OK.
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Penetration Testing Icon
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Malware icon with long shadow
Security Icon
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Cybersecurity, phishing awareness, identity protection, data privacy, online scams, digital safety. Head, brain mapping phishing hook lock icon coding. Cybersecurity and phishing awareness concept
Collection of broken shields with cracks and damage, symbolizing vulnerability and failure.
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
vulnerability line icon
Protection background. Technology security, encode and decrypt.
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
System Vulnerability Icon
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Vulnerability Management and analysis security hacker
An elderly man rests peacefully in a hospital bed, surrounded by medical equipment, representing the vulnerability and care of health in hospital settings.
Risk Assessment Icon
Data scientist managing cybersecurity system and network for company cloud infrastructure
Adorable blue duck cartoon character with a yellow beak shedding tears, symbolizing deep sadness, distress, or a moment of grief and emotional vulnerability
Risk Management web icon set in line style. Risk analysis, risk investment, minimizing losses, plan, low cost, collection. Vector illustration.
Emotional vulnerability illustrated by a person with subtle cracks along their body, tiny floating shards and stars conveying introspection, fragile strength,
Security Vulnerabilities Outline Color Icon
Emotional vow reading bride wiping a joyful tear while holding a small vow booklet as the partner listens attentively, expressing sincerity and vulnerability
Risk icon vector image. Can be used for Compilance and Regulation.
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Security Icon
3D Isometric Cybersecurity vector icons sets Global Protection Firewall and Data Security
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Vulnerability Vector Design
Support,Group,Trust,Motivation, multiple style icon set.
脆弱性診断のアイコン
Vulnerability Assessment Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Risk icon sheet multiple style collection
Hacker behind a wall with credit card and computer, surrounded by binary code
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Human factor vulnerability vector
Security Holes Blue Icon
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
A continuous line drawing of a heart intertwined with flowing waves, representing love and fluidity in a simple illustration
Hacker activity icon set collection. Simple line vector.
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Certified Ethical Hacker - CEH - icon set & web header banner
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Collection of eight black icons depicting padlocks in various stages of being broken or unlocked, symbolizing security breaches or access.
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Security assessment icon set multiple style collection
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
spectre and meltdown email spyware virus attack vulnerability vector illustration
Cybersecurity Icon Set – Vector Collection for Data Protection, Threat Prevention & Risk Management
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
A graphic symbolizing a digital security breach or vulnerability in a protective shield.
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Cybersecurity Evaluation Process. Cyber vulnerability assessment. Professional reviewing system components with checklists and alert icons, careful and
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Threat Detection icon set multiple style collection
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Sign of Meltdown and spectre vulnerability on notebook monitor
Vulnerability Icon
Risk management and financial business danger evaluation tiny person concept, transparent background.
Cybersecurity icons: password cracker, network scanner, ddos, malware, firewall bypass
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Risk Management Risk Management Bundle H50
Vulnerability Icon
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Internet Security Isometric Design Concept
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Analytics Icon
Cyber or web security online service or platform set. Digital data
Threat Detection Glyph Icon
vulnerability search icon. Vector illustration
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Next page
/ 10