Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Ethical hacker abstract concept vector illustration.
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Sicherheitslücke finden
vector icon of a document with a shield with a blue background in the shape of a shield
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
vulnerability line icon
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Risk management line outline icon
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
unprotected
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
risk management asset vulnerability assessment concept
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Simple set of vulnerability related filled icons.
Zero Day Icon
Digital lock protect data flow in global network
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Certified Ethical Hacker - CEH - icon set & web header banner
Bug Icon
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Risk management and financial business danger evaluation tiny person concept, transparent background.
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Security scan flat line icon set. Security scan Thin line illustration vector
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Secure data storage concept with blocks and padlock illustration.
Secure data storage concept with blocks and padlock illustration.
4upict (1032).eps
Security Vulnerabilities Flat Icon
Broken padlock icon symbolizing security breach vulnerability and unauthorized access representing a critical failure in data protection
Security shield with exclamation mark warning icon
Abstract technology security  global network background, vector
Disruption Multistyle Icon Set
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Print
Risk Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Data breach security attack and hacker fraud problem tiny person concept
Supply Chain Risk Icon
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Cybersecurity threat modeling process flowchart diagram with risk assessment and attack vectors
Hacker in a dark hoodie stealing confidential data from a laptop computer folder. Cyber attack, internet crime, phishing, and online fraud concept. Torn paper sticker vector.
Green boxing glove striking a user profile icon below a minimalist cloud, symbolizing cyber threats, privacy, conflict, strength, security, vulnerability. Ideal for risk, protection simple flat
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Four open padlocks showing different styles of broken security
Cyber security threats on smartphone. System vulnerability warning. Mobile phone hacking. Cybercrime or antivirus concept. virus, malware, ransomware, or bug. Flat cartoon icon. Vector illustration.
Broken chain link with lightning bolts symbolizing weakness and vulnerability
Risk Icon
Programmer at work. Computer assisted design, developer testing program.
System administrator online service or platform. Technical work with server
Secure Icon Matrix. Secure Setup Set linear set: config matrix, authentication key, encryption lock, protocol setting icon, secure parameter tile, vulnerability scan marker,
Cybersecurity concept warning on hacker laptop
Illustrative fractured USB stick, highlighting digital security vulnerabilities
Honeypot Icon
Vulnerability Multistyle Icon Set
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Hacker activity icon set collection. Simple line color vector.
Frayed rope symbolizes tension and potential breaking point.
Risk management process, business vector concept
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Business IT Security Concept Design, Mesh of Connected Network Client Nodes
tropics map showing warm climate regions ideal for climate research illustrating heatwave patterns and vulnerability in tropical countries.
A security shield with an exclamation point, symbolizing vulnerability.
Illustration of two people, one holding a key and the other a tablet, near a secure vault.
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Cybersecurity, vulnerability analysis, emotional responses, safety, data protection, conceptual design. A cheese piece with holes, a neutral face and a padlock. Cybersecurity and vulnerability
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Cybersecurity icons portraying digital protection for networks, data, and personal information, ensuring online safety in the digital age with shield and lock symbols
Various cyber attack outline icons, including security symbols and hacker illustrations.
Vector line art illustration of an open padlock, symbolizing broken security, vulnerability, or unauthorized access. This icon represents digital protection concepts
Computer security specialist online service or platform set. Idea of digital
Vulnerability Icon Collection Set Multiple Style
Virus on laptop, malware or network vulnerability vector
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
Big risk problem, danger or challenge, fear of crisis or disaster, courage or determination to overcome problem, vulnerability or hopelessness concept, business people face big wave danger problem.
Magnifying Glass Inspecting Warning Sign Risk Analysis Icon
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Certified Ethical Hacker - CEH - icon set & web header banner
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Cyber attacks blue word concept. Phishing attack. Data protection. Software vulnerability. Horizontal vector image. Headline text surrounded by editable outline icons. Hubot Sans font used
Cyber threat word concept isolated on white. Access management, system hacking. Software vulnerability. Creative illustration banner surrounded by editable line colorful icons. Hubot Sans font used
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Abstract symbols linear icons set
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Ethical hacker. Character conducting a security penetration test. White
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Next page
/ 10