Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Security Icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Hacker in a mask
broken padlock glyph icon
Cybersecurity Icon Set collection with antivirus, password and internet icon
Computer security specialist online service or platform. Idea of digital
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Risk icon vector image. Can be used for Compilance and Regulation.
Risk Assessment Icon Set Multiple Style Collection
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
Protection background. Technology security, encode and decrypt.
Weakness Outline Icon
Maintenance smartphone technology search system
Isometric cybersecurity icons with warning symbols in vector art
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Software security vulnerability assessment using robots and professionals
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Login Password Laptop Composition
Malware icon with long shadow
Security assessment icon set multiple style collection
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Analytics Icon
Finger pointing at cyber security lock
Flat isometric illustration concept.  security network
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
thin line assess icon like review audit risk
Threat Detection Glyph Icon
Man and woman couple shivering from low temperature at home feeling frozen due to lack of heating
脆弱性診断のアイコン
Vulnerability Assessment Icon
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Black line icon for Vulnerability
Cloud security vector line icons set. Cloud, security, infrastructure, data, authentication, compliance, encryption illustration outline concept symbols and signs
Computer Problem User Composition
Penetration Testing Icon
Threat Assessment Icon
Blockchain security line icon set. Editable stroke. Vector illustration
Ethical hacker set. Character conducting a security penetration test. White
System Vulnerability Icon
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Broken shield icon vector outline set illustration sign
spectre and meltdown email spyware virus attack vulnerability vector illustration
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Cyber scanner Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
phone virus hack icon sign vector
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Zero Day Multistyle Icon Set
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Security Icon
Protection background. Technology security, encode and decrypt, techno scheme
Security Testing Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Risk Assessment Icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Vulnerability Icon
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Risk Icon
Digital lock protect data flow in global network
malware, cyber attack line vector icon
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Ethical hacking and cybersecurity icon set for security, featuring hacker, data protection, and network threat symbols for digital defense, white hat operations, and vulnerability assessment.
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Exploit Icon
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Flat illustration of woman managing IoT security internet of things protection
Security warning shield indicating a potential threat or vulnerability
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Threat Detection icon set multiple style collection
Next page
/ 10