Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Virus Icon Set Multiple Style Collection
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
HACCP icon set containing hazard, analysis, critical, control and points vector icons.
Risk Icon Line and Black Fill Style Collection
Digital Guardian of the Web An Abstract Illustration Symbolizing Cybersecurity, Anonymous Protection, and the Enigmatic World of Online Data Networks
Hacker in Black Hoodie and Mask Working on Computer.
Supply chain disruption management risk strategy vulnerability
vulnerability icon set multi style various collection
Cybersecurity threat icon set depicting a computer bug with an integrated circuit, representing malware, virus, software error, or system vulnerability
Data security and protection concept with shield and cube icons
Two silhouetted hands reaching for each other a connection attempt
Illustration portraying expressive eyes with tears conveying deep sadness and vulnerability
Unprotected Website Vector Icon
Threat Detection icon sheet multi style collection
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Hammer and Cracked Shield Icon
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Training  Icon Element For Design
Cyber security team with ssl certificate
Classic car under lightning storm isolated on white background, representing danger, power, and the vulnerability of vehicles to weather
Cybersecurity control room with analysts monitoring data on computers and security themed wall art
Website security vulnerability illustration showing software bug detection
Collection of broken shield outline icons, representing concepts of security breach, vulnerability, and protection failure. Minimalistic linear pictograms suitable for web design, graphic design, app
Leadership Vulnerability Icons. Leadership vulnerability. Line icon set of leadership vulnerability: heart, shield, open hand, human head, speech bubble,
Collection of ten cracked shield icons in a vector cartoon illustration style, presented on a black background, representing concepts of broken security, vulnerability, and failed protection, ideal
Vulnerability Icon Collection Set Multiple Style
Weakness, broken chain links icon vector. failure, vulnerability, needing repair symbol. vector illustration.
Broken chain link illustration symbolizing weakness vulnerability or disconnection with clouds
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Cybersecurity line icon set. Vector pictograms of mobile protection, user access, server, hacker, malware, data storage, and biometrics, thin linear illustration.
Eye with Lock and Key - Online Surveillance Awareness and Privacy Caution.
Set of five cracked shield icons in a line, drawn with thin black lines on a white background, representing broken security, vulnerability, and failure. Simple vector cartoon illustration.
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Cracked shield symbolizing security threats and cyber vulnerabilities
Set of seven linear vector shield icons with cracks, symbolizing broken security, vulnerability, or failure. These simple, clean line art illustrations on a white background are perfect for
Missiles labeled DDoS moving toward a laptop and a box symbolizing system vulnerability and data targeting. Ideal for cybersecurity, digital threats, data loss, hacking, online safety, IT security
“The forest listens to their breath.”
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Collection of fifteen cracked shield icons, hand-drawn in a white line art style on a black background, representing broken security, vulnerability, and damage, perfect for digital and print design
Set of 15 cracked shield icons, simple thin line art, perfect for websites, books, cards, and apps. Vector cartoon illustration representing broken security, vulnerability, and damage, isolated on a
Threat vector icon
Set of 15 cracked shield icons in a linear style, representing broken security, vulnerability, or damage. These vector graphics are perfect for graphic design, web sites, cards, books, and articles
Cartoon capybara illustration depicting sadness and emotional vulnerability in the rain
Collection of cracked shield outline icons, representing broken security, vulnerability, and data breaches, perfect for websites, apps, and infographics, presented as a vector cartoon illustration on
Distressed patient in hospital bed with IV drip, vector illustration for emotional healthcare, medical treatment, and patient vulnerability concept
Set of four cracked shield pictograms in a line, representing broken security, vulnerability, or failed protection. These vector illustrations are perfect for interface elements, social media posts
Vulnerability  White Icon Set Design
Risk Icon
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
broken padlock symbolizing a data breach, vector illustration for cybersecurity threat, information leak, and digital vulnerability
Cartoon tree bending under strong winds, illustrating nature's power and climate change vulnerability
Silhouette of a person curled up in a fetal position
Silhouette of patient resting in hospital bed with IV drip, conveying vulnerability and medical care in a stark, symbolic depiction.
Set of ten minimalistic thin line icons representing cracked shields, symbolizing broken security, vulnerability, or failed protection. These vector graphics are ideal for web design, app interfaces
Grunge style rectangular rubber stamp displaying text IT SECURITY RISK, indicating potential digital vulnerability or cyber threat assessment
Malware warning in address bar above waves and cloud emphasizes cybersecurity risks, online threats, and web safety. Ideal for internet security, data protection, IT risk, software vulnerability
Scanner vulnerability detection vector analysis cybersecurity icons icon behavioral sandbox analytics grid
Set of 15 minimalistic thin line icons representing cracked shields, symbolizing broken security, vulnerability, or failed protection. Ideal for web design, app interfaces, banners, social networks
Risk Assessment Icons. Line style icons of risk assessment tools: risk matrix chart, likelihood vs impact icon, vulnerability
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Threat vector icon
Delete your data with this vector trash can, a concept for data privacy and personal data security after a data breach in a vector graphic
Ballot box icon, with cracks symbolizing security threats.
Risk Icon
Global supply chain disruptions impacting business operations and financial stability worldwide
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Security check icon with shield and magnifying glass. Concept of protection, safety audit, data privacy analysis, and vulnerability scan. Linear vector symbol for web and apps.
Broken chain link connection failure concept metaphor for disconnect and vulnerability symbol for weakness
Collection of minimalistic outline icons representing cracked shields and a radiator, symbolizing broken security, vulnerability, and potential damage. Ideal for web design, app interfaces, social
Vivid and dynamic cracked shield thin line icon, perfect for web, books, cards, and apps. This cartoon illustration features a stylized shield with a prominent crack, symbolizing vulnerability
Training icon set multiple style collection
Security Breach Icon
Collection of cracked shield icons in a linear style, representing broken security, vulnerability, and loss of protection. These vector graphics are perfect for designs, books, adverts, and apps
Broken shield icons symbolizing security breach, failure, damage, and vulnerability protection
Threat detection vulnerability scan security risk assessment icon vector eps silhouette
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
Collection of ten cracked shield line icons, representing broken security, vulnerability, and damage, suitable for websites, apps, and infographics, presented as a vector cartoon illustration on a
Distressed and fractured circle design representing vulnerability and fragility symbol
Cybersecurity vulnerability concept with unlocked padlock and lightning bolt, highlighting potential security breaches and the importance of data protection
Ethical Hacking Icons. Ethical Hacking silhouette icon set: laptop with code, shield icon, hacker silhouette, vulnerability report, checklist document, firewall grid, magnifying
Threat vector icon
Secure data storage concept with blocks and padlock illustration.
Broken chain link illustrating weakness vulnerability or failure in a system
Vulnerability Icon
Weaknesses icon set in line and glyph style on black and white background
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Relational architecture map with vulnerability chamber and trust scaffolding
Security assessment icon set multiple style collection
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Set of five cracked shield outline symbols, representing broken security, vulnerability, or failed protection. These versatile vector graphics are ideal for use in designs, books, advertisements, and
Illustration of a person in a hoodie and mask typing on a keyboard in front of computer screens
Cybersecurity threat modeling process flowchart diagram with risk assessment and attack vectors
Security Testing icon vector image. Can be used for Quality Assurance.
Training  Icon Element For Design
Network security specialist monitoring firewall defense system in a cyber security operation center
Monitor with digital alerts, security icons, pie chart, and boxes illustrating cybersecurity, online privacy, risk assessment, data analysis, logistics, e-commerce and vulnerability as simple flat
3D Isometric Cybersecurity vector icons sets Global Protection Firewall and Data Security
Next page
/ 10