Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Threat Detection Icon Set Vector Collection Isolated In Black And White
Cracked Heart And Broken Stone Doodle Sketch Set. Emotional Vulnerability And Heartbreak In Hand Drawn Style Collection. Symbolizing Fragility And Emotional Pain. Isolated Vector Illustration
Internet Security Isometric Design Concept
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Vector light Risk management process diagram schema
Securing Digital Assets Cloud Data Protection and Cybersecurity
Cybersecurity icon set for virus protection and malware detection. Vector concepts of security shield, computer bug, warning sign, and vulnerability scan for digital safety.
Network Defense icon set black and white
Cybersecurity, finance security, digital threats, vulnerability, malware, money protection. Sad face, coin bug symbol financial and digital risks. Cybersecurity and finance security concepts
Broken Chain Connection Cybersecurity Concept
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Data breach security attack and hacker fraud problem tiny person concept
Risk management mind map flowchart business concept for presentations and reports
Software quality assurance, cybersecurity firewall, system, software icon
Malware infection on document causing software security vulnerability concerns
Training icon set multiple style collection
Set of black chain link icons in various styles, including a broken link, representing connection, security, strength, and disconnection in a minimalist vector graphic illustration
Weaknesses icon set , Broken chain link with jagged edges icons. Link chain icon flat illustration set logo
Broken shield icon Simple thin outline
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Malware Icon Set Multiple Style Collection
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Broken chain link representing weakness and vulnerability in a simple line art drawing
Cyber Security Icon Sheet Multiple Style Collection
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Protection simple icon set. Set of line pictogram. Privacy icon set. Contain linear sign cyber, antivirus, safe, safety, software and more.
Stylized broken dna strand depicting genetic mutation and health science
Compliance icon set black and white
Breach Icon
Broken shields show vulnerability and represent failure,Broken shield icons in bold and outlined styles.Broken Shield icon - vector. Security Shield icon in flat style. Symbols of broken protection.
Computer Security Bug Icon
A striking black shield icon with a classic design beautifully rendered as a bold silhouette
Abstract Silhouette of a Tent with Cracked Ground.
Abstract Digital Spider Web Mesh Pattern on Dark Background, Technology Network Concept
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Cyber Security Icons Set Shield Protection Data Network.
Weaknesses icon set , Broken chain link with jagged edges icons. Link chain icon flat illustration set logo
Disrupted genetic code illustration depicting dna fracture and vulnerability in black
Dramatic silhouette of a man falling or floating, conveying fear, stress, or a dreamlike state with a simple black and white design for impactful visuals
Vulnerability Icon Set Multiple Style Collection
Abstract symbols linear icons set
Cybersecurity Icon
Data Breach Icon Sheet Multiple Style Collection
A series of silhouettes depicting a person overwhelmed with distress and pain
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
 risk
System Hardening icon set black and white
Cyber Security icon collection set. Simple color fill vector illustration.
Supply Chain Risk Icon
Risk
Valentine y26 (27)_traced
black fill vector illustration presenting a security concept with a fingerprint and an open padlock an ideal icon to represent vulnerability or biometric access
Silhouette of a brave rescuer wearing a helmet and flotation vest carrying a small child while wading through floodwaters with essential supplies over his shoulder symbolizing hope and aid
Cyber Risk and Threat Detection Icon Pack for Security Monitoring and Incident Response
Frayed rope symbolizes tension and potential breaking point.
Route misdirection, sad face, downward trend, bug warning on URL bar. Ideal for cybersecurity, navigation error, data loss, online risks website threats analytics warning concepts. Clean flat
Security and privacy icons including fingerprint and warning signs
Continuous one line of a lightbulb glowing faintly inside shattered glass, sleek minimal fragile hope symbolism design, hand drawn vector illustration.
A close up portrait of a young person with scars on their face looking worried and distressed surrounded by tropical leaves
Security Patch Icon Set Vector Collection Isolated In Black And White
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Vulnerability  Icon Set Multiple Style Collection
Weaknesses icon set , Broken chain link with jagged edges icons. Link chain icon flat illustration set logo
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
Minimalist Icons: Mountains, Broken Shield, Open Door, Storm Cloud, representing concepts like achievement, vulnerability, opportunity, and challenge, Clean graphic design with flat colors
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Compliance icon set black and white
Sharp, graphic cracks with jagged edges illustrate concepts of damage, fracture, and the ultimate breaking point, creating a dramatic visual metaphor for stress and instability
Set of Engraving Designs Featuring a Young Man Staring into a Mirror with Doubt – Symbolic Art of Self-Reflection, Identity, and Inner Struggle – Detailed Line work for Creative Projects young man
System Vulnerability Icon
Bug fixing doodle for improve website performance
Security Testing Icon
Vulnerability  Icon Set Multiple Style Collection
Exploit Multistyle Icon Set
Illustration of a broken chain link symbolizing weakness or vulnerability.
Collection of black chain link icons representing connection, disconnection, strength, and weakness in a minimalist vector style with whole, broken, and circular variations
Soldier in gas mask with wide fearful eyes, reflecting red flash of nuclear detonation in lenses, surrounded by ominous smoke and chaotic atmosphere, depicting intense wartime emotions
Continuous one line of a single balloon floating above a ruined cityscape, elegant minimal resilience amidst despair symbolism art, hand drawn vector illustration.
Hacker activity icon set collection. Simple line color vector.
Security Breach Icon Set Multiple Style Collection
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Security audit and vulnerability assessment with magnifying glass and shield icons vector
Explaining Cyber Security Tips Young Man Pointing To A Computer Screen In Modern Workplace
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
Password Cracking Icon Collection With Multiple Styles
Failure Mode Outline Icon
Cyber Intelligence icon set black and white
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Spam link detected on computer web. Dangerous link concept.
Couple on house roof during flood, car submerged in rising water
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
Cyber attack concept with shield and hacker in dark background
Security system icon set featuring alarms, detective, fingerprint, vulnerability, network, system,  and surveillance symbols for safety, monitoring, and protection projects.
Black bug icon beside dollar coin, signifying financial loss from cybersecurity threats. Ideal for malware risk, cybercrime, software vulnerability, data breach, fraud, hacking, simple flat metaphor
Hands Holding Earth in Minimalist Illustration for Environmental Awareness
This illustration depicts a robust digital security shield protecting interconnected cloud computing networks, symbolizing data integrity and online privacy.
A comprehensive collection of outline icons representing digital security, data protection, network safety, and system management solutions for modern technological environments
Hacker icon set. A simple vector illustration of a hacker in a hoodie using a laptop with a skull symbol on the screen. vector illustration on white background.
Cloud security alert icon symbolizing potential threats or vulnerabilities in cloud storage, emphasizing data protection and cybersecurity measures
Next page
/ 10