Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
 risk
Visual representation of software vulnerability detection icon illustration
cyber security icon sign vector
Insecure Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
security assurance icon sign vector
Honeypot Icon
Cybersecurity consulting service gradient header information consultant professional solution for company information technology cyber security
Exploit Icon
Penetration Testing Icon
Broken shield icon Simple thin outline
Cyber Risks Icon Style
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
IT risk glyph icon
Security Patch icon
data and document protection
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
 Icon of Vulnerability for Security Management
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple flat vector illustration.
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Vulnerability Icon
Detection Icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Risk Flat Icon
Cyber threat Icon
Risk Icon
Security Risks Icon Style
Threat Icon
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Risk Factors Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
 Essential Vulnerability Icon for Cybersecurity
Supply Chain Risk Icon
Weakness Outline Icon
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
AI technology in security set. Characters using artificial intelligence, algorithms, generative tools for data protection, cybersecurity, privacy, hacking threats prevention. Vector illustration.
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Security Breach
Penetration Testing Icon
password fraud icon sign vector
Security scan Icon
Threat Icon
The program offers a safe space for individuals to share their vulnerabilities and receive understanding and validation from their peers.. Vector illustration
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Emotional Vulnerability Vector Icon
 Comprehensive Vulnerability Icon for Protection
Cyber Threat Icon
Failure Mode Outline Icon
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple glyph vector
Sad depressed woman in despair and grief mood, sitting curled up, hugging knees. Frustrated desperate upset female, overwhelmed by sorrow. Flat vector illustration isolated on white background
A hand delicately pierces a balloon labeled ego, symbolizing the fragility of self-importance in a serene and minimalistic setting that evokes thought and reflection
Security Vulnerability Icon
Exploit Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Vulnerability Icon
security antivirus check mark icon sign vector
Risk Icon
Penetration Testing Icon
silhouette of a girl and  domestic violence
Threat Icon
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Emotional Vulnerability Icon
 Security Testing Icon for Vulnerability Assessment
Penetration Testing Icon
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple line vector illustration.
Security warning shield indicating a potential threat or vulnerability
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
A woman standing in fear beneath two large hands in a flat, minimal design style vector illustration depicting vulnerability and tension in an abstract environment
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Vulnerability  Icon Set Multiple Style Collection
Dpia protecting data with shield and lock symbol
computer protection icon sign vector
Penetration Testing Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Illustration of a man using a laptop with an unlocked password, signifying data security issues Consider using it for cybersecurity or data protection concepts.
Threat Icon
This vibrant illustration features various elements depicting disproportionate ransomware threats, Customizable illustration of disproportionate ransomware.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Information security analyst icons outline key concepts like surveillance, access control, and data protection, transparent background. Outline icons set
 Icon of Security Patch for Vulnerability Management
Next page
/ 10