Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Vector light Risk management process diagram schema
Failure Mode Outline Icon
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
hacker logo. vector. editable.
Threat Icon
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Risk Assessment Icons. Line style icons of risk assessment tools: risk matrix chart, likelihood vs impact icon, vulnerability
Certified Ethical Hacking icon showing security and hacking idea
Breach icon sheet multiple style collection
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Cybersecurity issue icon
Cyber threat Icon
A broken wire mesh fence with a large torn hole and bent wires, symbolizing damage, decay, and vulnerability in urban or industrial settings.
AI Safety secure data attack vulnerability prevention concept with icon smart machine learning security Protection Privacy Artificial Intelligence Design
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
Market Data Icon  in black line style icon, style isolated on white background
Dark Web Hacker Deal: Cyber Crime, Online Fraud, Data Breach. Anonymous Criminal Buying Stolen Information. Internet Security Concept. Digital Piracy and Cyber Attack.
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Abstract technology security on global network background, vector illustration
Incident Multistyle Icon Set
Risk management linear icons set. Probability, Uncertainty, Mitigation, Contingency, Hazards, Vulnerability, Security line vector and concept signs. Resilience,Exposure,Loss outline Generative AI
Open backdoor in a black wall cybersecurity concept illustration
Data Breach Icon Sheet Multiple Style Collection
Secure Coding Icon
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
A striking black shield icon with a classic design beautifully rendered as a bold silhouette
Vulnerability Icon Collection Set Multiple Style
black fill vector illustration presenting a security concept with a fingerprint and an open padlock an ideal icon to represent vulnerability or biometric access
Cybersecurity, data breaches, history, education, typography, nature . Abstract geometric Trojan horse, the letter D and flowers. Cybersecurity and data breaches conceptually
Valentine y26 (27)_traced
Software development, debugging, code testing, and finding system vulnerabilities
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
System Vulnerability Icon
Comprehensive vector icon set showcasing digital security shields with intricate circuit board patterns, symbolizing robust cybersecurity, data protection, and online privacy solutions for technology
Network security alert and vulnerability icon set including a warning triangle, broken shield, and padlock symbol, cybersecurity concept
Cyber security and data protection icons with locks shields bugs and firewalls symbolizing network defense and threat prevention
Soft Morning Dew
Silhouette of a brave rescuer wearing a helmet and flotation vest carrying a small child while wading through floodwaters with essential supplies over his shoulder symbolizing hope and aid
Security audit concept showing shield with checkmark and magnifying glass for system inspection and vulnerability testing representing digital safety assessment and verification of online records
Digital security padlock icon with network connections on a dark blue background
Security system icon set featuring alarms, detective, fingerprint, vulnerability, network, system,  and surveillance symbols for safety, monitoring, and protection projects.
A striking illustration of a broken chain link representing weakness and the end of a connection, ideal for projects conveying concepts of failure, freedom, or overcoming challenges in
Vulnerability Icon
Exploit Icon In Black And White Glyph Style
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Set of Antivirus line icon. Pictograms of software, threat, safety, tech, security, anti, defense and more. Outline icons pack. Protect icon set. Editable stroke. Pixel Perfect.
Security, privacy, and protection symbols: black silhouette vector icons on transparent background
Collection of Security Shield Icons and Symbols.
Repeating silhouette of a grieving person isolated on transparent background
The Ultimate risk Styles with Variations Line of icon set vector illustration
Comprehensive Digital Security Shielding Network Infrastructure from Cyber Threats and Data Breaches
Black Shield Icon with Open Padlock Symbolizing Security.
Broken padlock icon symbolizing security breach vulnerability and unauthorized access representing a critical failure in data protection
Illustration of a broken chain link symbolizing weakness or vulnerability.
Broken shield icon concept of vulnerability and risk. Cracked guard symbol of failed security, data breach or damage. Metaphor for weakness, unprotected system failure.
Cyber Security Guard Shielding System Against Threat Vulnerability Attack
Cybersecurity line icon set. Vector pictograms of monitor lock, email alert, shield, hacker, server, cloud, password, fingerprint, firewall, VPN, USB drive, warning, thin linear illustration.
Hacker attack on computer. Cyber security threat, data phishing concept. Anonymous criminal stealing login and password information. Internet privacy breach vector.
Three black hearts depicting stages of damage a striking silhouette
Baby footprints one dark and one outlined a simple graphic silhouette
Set of black silhouettes showing a lonely woman sitting on a chair in various sad and depressed poses for mental health and grief concepts
Bullet holes and impact patterns displayed in a grayscale arrangement
Cybersecurity line icon set with padlock shield firewall user fingerprint cloud code globe and bug symbols
Detection Icon
Broken crown icon on dark blue
Cyber Threat Icon Sheet Multiple Style Collection
System Vulnerability Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Cracked shield icon vector, broken protection symbol, security breach concept, damaged shield illustration, defense failure, vulnerability emblem, cartoon style graphic vector
A distressed figure sinking and a reaching hand emerging from dark waters
Cute chick standing next to broken eggshells on ground
ID badge next to a bug under a cloud represents digital identity, cybersecurity threats, and data protection issues. Ideal for IT, tech safety, risk management, digital ID, software vulnerabilities
Icon of a hand receiving an electric shock from a frayed wire, symbolizing danger and electrical hazard
Overwhelmed person bowing head amidst explosion of abstract colorful geometric shapes, symbolizing stress
Data Breach icon set. Includes data, breach, cyber, attack, hacking, leak, exposure and More. Editable Stroke Icon Collection.
Computer cybersecurity infographic shield padlock monitor data protection template
IoT security and surveillance camera vulnerability illustration with a spy character representing the risk of unsecured cameras and default passwords
Melting Heart A Symbol of Love and Vulnerability.
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
A collection of cybersecurity icons for protecting computer systems and data
Large set of black silhouettes featuring elderly men and women walking with canes in various hunched and standing poses for geriatric care and senior health concepts
Broken chain links with various colors showing a disconnection or failure in a system representing weak points and lack of security.
Stealthy cyber criminal wearing a black hoodie sneaks toward a laptop in a brightly lit modern apartment living room.
Hardening Icon In Black And White Glyph Style
Information technology icon set. Cybersecurity, secure connection, privacy, encrypted, firewall, online protection
A surreal illustration depicts multiple businessmen in suits falling through the air in various dynamic poses.
A caring individual assists an elderly person using a walking aid
Risk icon set collection multi-style.
A stitched heart with a needle and thread symbolizing repair and affection
A touching vector artwork portrays a woman resting sadly on her bed, symbolizing emotional pain, introspection, and human vulnerability through a soft, minimal, and intimate visual scene.
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
Powerful tsunami wave towers over city and boat illustrating catastrophic flooding danger urban vulnerability and nature’s destructive force
Stick Figures on Bench Showing Vulnerability and Innocence, stick figures, bench illustration, emotional expression, vulnerability art, open body language, child-like innocence, Sarah and Marcus,
Sql Injection
Laptop icon infected by malware with long shadow on white backgr
password leak out and got data breach to hacker
Information Technologies Horizontal Banners
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Next page
/ 10