Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Ethical hacker abstract concept vector illustration.
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Simple set of vulnerability related filled icons.
risk management asset vulnerability assessment concept
A person stands safely inside a protective dome as chaos and destruction rage outside, symbolizing resilience, security, and the ability to weather any storm.
unprotected
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Conceptual illustration of a cloud security breach with an unlocked padlock icon representing data vulnerability and risk.
virus line icon
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Bug Icon
Red Fragile Stamp Illustration on White Background Grunge Style for Shipping and Handling Safety
Digital lock protect data flow in global network
Risk management and financial business danger evaluation tiny person concept, transparent background.
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Security scan flat line icon set. Security scan Thin line illustration vector
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Certified Ethical Hacker - CEH - icon set & web header banner
Zero Day Icon
Understanding the Continuous Cycle of Effective Risk Management Processes From Identification to Monitoring
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Security Audit multistyle icon
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Security Vulnerabilities Flat Icon
Breach Icon
Abstract technology security  global network background, vector
Risk Icon
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Supply Chain Risk Icon
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Vulnerability Outline Icon
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Print
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
System Vulnerability Icon
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
Cybersecurity concept warning on hacker laptop
Security check icon with shield and magnifying glass. Concept of protection, safety audit, data privacy analysis, and vulnerability scan. Linear vector symbol for web and apps.
Threat vector icon
Vulnerability Multistyle Icon Set
Worried woman with flu symptoms wiping nose surrounded by virus particles, a health crisis awareness visual symbolizing contagious illness and personal vulnerability
Sad Girl in Despair: A young woman, hair cascading down, her body language betrays a deep sense of isolation. A melancholic portrayal of emotional vulnerability and the weight of sadness
Broken chain link with lightning bolts symbolizing weakness and vulnerability
Security vulnerability concept with a cracked shield and open padlock inside a red circle on a dark background, suggesting a system is at risk of cyber attack
System Vulnerability Icon
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Collection of cracked shield line icons, isolated on a white background, representing broken security, vulnerability, or failed protection. This vector set includes various styles of shield damage
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Risk Icon Set With Multiple Style Collection
Risk Icon
Programmer at work. Computer assisted design, developer testing program.
System administrator online service or platform. Technical work with server
Broken cybersecurity padlock with digital data breach and system vulnerability warning sign for online safety
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Business IT Security Concept Design, Mesh of Connected Network Client Nodes
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Dramatic black crack silhouette against a stark white background conveying fragmentation and disruption
“Her love blooms beyond time.”

“Infinity wears petals and promise.”
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
A security shield with an exclamation point, symbolizing vulnerability.
4upict (1032).eps
Honeypot Icon
Abstract radial pattern of shattered glass with a central hole and radiating cracks on a light gray background
Digital shield disintegrating on teal backdrop, for security concept use, privacy concerns, or technological vulnerability
Risk management process, business vector concept
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple line vector
Crime scene on a laptop
Spam link detected on computer web. Dangerous link concept.
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Computer security specialist online service or platform set. Idea of digital
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Two people using laptop computers showcasing endpoint security, representing digital protection and cybersecurity solutions for data privacy
Cybersecurity concept warning on hacker laptop
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
 risk
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Abstract symbols linear icons set
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Ethical hacker. Character conducting a security penetration test. White
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
System administrator online service or platform set. Technical work with server
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Next page
/ 10