Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Threat Assessment Icon
Login Password Laptop Composition
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Csrf Icon Multi Color Vector Illustration
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
spectre and meltdown email spyware virus attack vulnerability vector illustration
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Security Breach Icon
Cyber security vulnerability icon, blue shield with open padlock symbol, indicating data breach, unlocked access, or risk
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
vector icon of a document with a shield with a blue background in the shape of a shield
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Honeypot Icon
security breach alert
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Risk management line outline icon
Solitary sadness: A depiction of sorrow and emotional vulnerability in minimalist style illustration on white background
Risk Assessment Icon Set Multiple Style Collection
unprotected
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Vulnerability Icon
Computer Programing icon collection set. Containing performing, cpu, computing, integration, testing, analysis, generating, algorithms, hardware and debugging icon. Simple flat vector.
mental breakdown concept illustrating psychological stress and emotional vulnerability for mental health awareness campaigns
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Disruption Multistyle Icon Set
Modern minimalist line icons for cyber security, data protection, and internet privacy, ideal for secure digital technology and online safety infographics
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Cybersecurity threat concept with syringe injecting malware into computer chip, data breach risk, digital attack, virus protection, vector design element
a somber depiction of a child in a seated crouching position head bowed conveying feelings of sadness and vulnerability silhouette
Risk  Icon Set Different Style Collection
Silhouettes of person in progressive crouched postures, illustrating emotional descent, distress, and vulnerability
A collection of hacker-themed outline icons, showcasing technology and cybersecurity elements.
malware, cyber attack or virus line icon
vulnerability search icon. Vector illustration
Risk Icon
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Icono escudo alarma color FB reflejo
Risk Word Cloud Risk, Risk Management Exposure Strategy Typography White Background
computer cyber security icon sign vector
This graphic features a hooded hacker figure alongside binary code, a broken padlock, a terminal window, and a warning sign to showcase data security issues.
Safety pin with heart
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Hooded figure using ai robot laptop symbolizing artificial intelligence in cybersecurity, hacking, and data threats
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Stick figures depicting stages of illness or declining health and wellbeing
Supply Chain Risk Icon
Line art illustration of a broken chain depicting disconnection for concepts of vulnerability
Risk Icon
*Stamp11
Cybersecurity Icon
Security warning shield indicating a potential threat or vulnerability
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Crime scene on a laptop
Digital security shield with a checkmark symbol on a dark blue background
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Cloud computing concept. Cloud shapes and a sad face data loss, connectivity issues, or digital frustration. Cloud technology, downtime, or vulnerability in tech. Ideal for tech troubleshooting, data
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
Man stealing chip and running away. Hacker stealing technology. Concept of data breach, file hacking, computer security vulnerability, or cybercrime. Vector illustration
Data Breach icon set multiple style collection
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Programmer at work. Computer assisted design, developer testing program.
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Twelve artificial intelligence security line icons depicting model integrity, secure inference, anomaly alert, and compliance in a clean, modern pictogram set for technology concepts
Risk Assessment Icon
Hooded figure using ai robot laptop symbolizing artificial intelligence in cybersecurity, hacking, and data threats
Bug Icon
vulnerability line icon
Set of six minimalist warning icons simple flat vector design element isolated on white background
Cybersecurity concept warning on hacker laptop
A striking red heart pierced by a bold arrow illustrates the concept of love passion and vulnerability
cybersecurity breach risk featuring a blue shield and red downturn arrow for illustrating financial market decline and data vulnerability impacts.
Earthquake damage icons show cracked buildings collapsing structures illustrating seismic activity destruction risk and urban vulnerability
System administrator online service or platform set. Technical work with server
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
risk management asset vulnerability assessment concept
Risk management process, business vector concept
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
thin line assess icon like review audit risk
Penetration testing vs vulnerability scanning flat style background design.
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Technology Shields Security,protection and Safe Concept,on Light Blue background Hi-tech and technology concept design.
Ethical hacker. Character conducting a security penetration test. White
Computer security specialist online service or platform set. Idea of digital
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Next page
/ 10