Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Risk  Outline Icon
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Collection of broken shields with cracks and damage, symbolizing vulnerability and failure.
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Risk  Icon Set Different Style Collection
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Data Breach Icon
Mental health issues concept. Flat vector illustration
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Adorable blue duck cartoon character with a yellow beak shedding tears, symbolizing deep sadness, distress, or a moment of grief and emotional vulnerability
Bug Bounty Icon with Beetle Design on Transparent Background
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
3D Isometric Cybersecurity vector icons sets Global Protection Firewall and Data Security
Vulnerability Icon
Vulnerability Vector Design
Protection background. Technology security, encode and decrypt.
Debug icon symbol collection on white background.
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Risk Icon
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
An illustration of a woman hesitantly holding a smiling mask, with a speech bubble that represents mental confusion, highlighting the brave act of admitting that it's okay not to be OK.
Human factor vulnerability vector
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Penetration Testing Icon
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Malware icon with long shadow
broken padlock glyph icon
Flat isometric illustration concept.  security network
lock With Keyhole on digital data background
A programmer or IT specialist analyzes a database, finding a critical error, threat, or system vulnerability with a magnifying glass
Threat Detection icon sheet multi style collection
Security Icon
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Red Balloon Popping Needle Isolated White Background
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
spectre and meltdown email spyware virus attack vulnerability vector illustration
Cybersecurity Specialist Investigating Data Protection With AI Powered Security Network
Risk icon sheet multiple style collection
Website security vulnerability illustration showing software bug detection
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
malware flat gradient icon
Black line icon for Vulnerability
A graphic symbolizing a digital security breach or vulnerability in a protective shield.
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Mitigation icon set collection in flat style. Icon pack contains mitigation, prevention, reduction, control, protection, security, planning, preparedness, management, response
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
脆弱性診断のアイコン
Vulnerability Assessment Icon
Sign of Meltdown and spectre vulnerability on notebook monitor
Cybersecurity Evaluation Process. Cyber vulnerability assessment. Professional reviewing system components with checklists and alert icons, careful and
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Threat Assessment Icon
Data scientist managing cybersecurity system and network for company cloud infrastructure
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
vulnerability line icon
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
3d shield under magnifying glass with red cross mark inside. Security failure detection, vulnerability identification, risk exposure analysis, threat diagnostics concept.
Risk icon vector image. Can be used for Compilance and Regulation.
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
System Vulnerability Icon
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Penetration Testing icon sheet multi style collection
Sicherheitslücke finden
Virus on laptop, malware or network vulnerability vector
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Hacker behind a wall with credit card and computer, surrounded by binary code
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Cybersecurity Icon Set collection with antivirus, password and internet icon
virus line icon
A continuous line drawing of a heart intertwined with flowing waves, representing love and fluidity in a simple illustration
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Risk Management web icon set in line style. Risk analysis, risk investment, minimizing losses, plan, low cost, collection. Vector illustration.
Collection of eight black icons depicting padlocks in various stages of being broken or unlocked, symbolizing security breaches or access.
Security Icon
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
risk management asset vulnerability assessment concept
Broken gate symbolizing vulnerability and unauthorized access shown as a simple fence with one panel tilted open and a small warning triangle nearby,
Support,Group,Trust,Motivation, multiple style icon set.
Penetration Testing Icon
Weakness Identification icon set multiple style collection
Next page
/ 10