Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Hacker activity icon set collection. Simple line color vector.
Risk Icon
Security Testing Icon
Weaknesses Icon
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Digital lock protect data flow in global network
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
System administrator online service or platform. Technical work with server
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
malware, cyber attack line vector icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Internet Security Isometric Design Concept
Security Scan Icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Hacker activity icon set collection. Simple color fill vector.
vulnerability line icon
Vulnerability Icon
Configuration Vulnerability Assesement
Data breach security attack and hacker fraud problem tiny person concept
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Flat illustration of woman managing IoT security internet of things protection
malware, cyber attack or virus line icon
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
vector icon of a document with a shield with a blue background in the shape of a shield
unprotected
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Cybersecurity concept warning on hacker laptop
Maintenance smartphone technology search system
Risk Icon
Vulnerability Multistyle Icon Set
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Broken shield icon Simple thin outline
Security Vulnerabilities Flat Icon
System Vulnerability Icon
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Illustrating the process of digital security and software testing for finding errors and vulnerabilities in code
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Abstract technology security  global network background, vector
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Print
broken padlock glyph icon
Vulnerability Multiple Style Icon Set Vector
Cyber security logo with shield and letters design
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
 risk
Computer security specialist online service or platform set. Idea of digital
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Business IT Security Concept Design, Mesh of Connected Network Client Nodes
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
thin line assess icon like review audit risk
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Risk icon sheet multiple style collection
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Supply Chain Risk Icon
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Cybersecurity concept warning on hacker laptop
A security shield with an exclamation point, symbolizing vulnerability.
Zero Day Multistyle Icon Set
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Risk management process, business vector concept
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple line vector
Certified Ethical Hacker - CEH - icon set and web header banner. System Cyber security and safety data concept . System hacking with info message.Blue background and a virus warning.
A sleek black and white vector icon depicting a wine glass with a visible crack  symbolizing breakage or damage. Perfect for designs related to fragility  accidents  loss  or vulnerability
Flat isometric illustration concept.  security network
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Computer security specialist online service or platform. Idea of digital
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
脆弱性診断のアイコン
Vulnerability Assessment Icon
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Computer screen displaying security shield and error symbols, with documents scattered around, indicating a potential data breach or security issue.
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Cybersecurity safeguards with multifaceted protective measures
Penetration Testing Icon
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Securing Digital Assets Cloud Data Protection and Cybersecurity
Abstract technology security on global network background, vector illustration
Sadness in Pairs: Two young girls sit, depicting the weight of sorrow. Their downcast eyes and posture portray a touching moment of grief and solitude.
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Network Security Icon
Next page
/ 10