Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Cyber Hacker Bypassing Digital Firewall Security Barrier. Conceptual Illustration of Unauthorized Data Access and System Breach.
Security Testing Icon
Cybersecurity threat line icons set illustrating virus, malware, phishing, ransomware, hacker, cyberattack, DDoS, data theft, keylogger, worm, trojan horse, exploit, vulnerability, and breach concepts
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Broken shield icon vector outline set illustration sign
Cybersecurity, online threats, 3D printing, innovation, emotion expression, technology icons. Geometric Trojan horse, 3D printing heart model neutral face symbol. Cybersecurity and online threats
set of distressed black padlock icons symbolizing security and vulnerability in access control
Weakness Outline Icon
vulnerability flower, bold style black Hand drawn set collection , white background , vector isolate
Digital Fortress Under Siege: A conceptual depiction of cybersecurity, showing a shield fractured by a cyberattack, emphasizing the vulnerability of digital data.
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Emotional vulnerability. A character gently opening up through floating speech bubbles with simple symbols, representing honest expression.
Woman Depressed, Hands Covering Face, Red Background, Anxiety, Stress, Sadness, Burnout, Mental Health, Emotional Pain, Depression, Vector Illustration , vector style simple color
Cybersecurity issue icon
Exploit Icon
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Cybersecurity concept with a hooded hacker typing on a keyboard, surrounded by glowing digital screens displaying code and a prominent padlock icon, symbolizing internet crime and data protection in
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Cracked shield with lightning bolt and circuit board elements on dark background symbolizing cyber security breach or vulnerability
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Blockchain security line icon set. Editable stroke. Vector illustration
Penetration Testing Icon
Protection background. Technology security, encode and decrypt.
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Cybersecurity Network Protection Diagram with Central Lock Icon for Data Security and Digital Privacy Compliance
Security Scan Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Threat Detection icon set multiple style collection
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Magnifying glass searching for viruses, malware, software bugs
malware, cyber attack line vector icon
vulnerability flower, 6 black delicate line drawings vector set collection , white background , PNG and SVG
Isometric cybersecurity icons with warning symbols in vector art
Online Robbery Icon
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Virus on laptop, malware or network vulnerability vector
Financial distress concept highlighting credit risk, insolvency exposure, and systemic vulnerability across economic cycles. in Lineal Icon Style
Cybersecurity related editable icon set. Contain icons related to data protection, internet security, privacy, firewall, encryption, secure network, hacking protection, and more. Editable stroke.
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
System threat detection and digital data vulnerability search concept.eps
Risk Icon
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Login Password Laptop Composition
Cybersecurity and network protection icons including cluster firewall vulnerability scan and threat detection elements
Risk Blue And White Icon Style Collection
Simple set of vulnerability related filled icons.
Technology Lock Security,protection and Safe Concept,on Global background Hi-tech and technology concept design.
Four black padlocks with one broken and cracking open
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
vulnerability flower , realistic line art vector set , white background , PNG and SVG isolate
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Hearing loss concept. Human ear disease or disability. Deaf person
Broken shield icon simple vector isolated symbol
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
spectre and meltdown email spyware virus attack vulnerability vector illustration
Penetration Testing Icon
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Outline Hacker Attack. Isometric Cyber Security Concept.
Programmers and IT Specialists at Work: A collection of illustrations detailing development workflow, troubleshooting, collaboration, and success.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Honeypot Icon
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Internet Security Isometric Design Concept
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
vector icon of a document with a shield with a blue background in the shape of a shield
unprotected
Certified Ethical Hacker - CEH - icon set & web header banner
Software security vulnerability assessment using robots and professionals
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Risk management line outline icon
Risk Assessment Icon Set Multiple Style Collection
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
Network Vulnerability, Vulnerable Smart Devices - IT Security Concept Design, Vector illustration
Vulnerability Icon
user protection icon sign vector
Antivirus software searching for viruses, malwares and vulnerabilities.
Abstract technology security on global network background, vector illustration
System administrator online service or platform set. Technical work with server
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Young people helping erderly at the bus stop. Blind man with guide dog, old woman with a cane, elderly man in a wheelchair. Social helping concept. Vector illustration.
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
malware, cyber attack or virus line icon
vulnerability search icon. Vector illustration
Magnifying Glass Inspecting Warning Sign Risk Analysis Icon
Risk Icon
Cybersecurity vulnerability black glyph icon. System weakness and flaw. Cybercriminal gains access. Errors exploitation. Silhouette symbol on white space. Vector isolated illustration
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Next page
/ 10