Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Threat Detection icon set multiple style collection
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
broken padlock glyph icon
Woman hugging a child, dark background, showing care and protection in simple art
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Malware icon with long shadow
Login Password Laptop Composition
Analytics Icon
Computer security specialist online service or platform. Idea of digital
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Frayed rope symbolizes tension and potential breaking point.
Finger pointing at cyber security lock
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Cloud security vector line icons set. Cloud, security, infrastructure, data, authentication, compliance, encryption illustration outline concept symbols and signs
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Cybersecurity professionals working together to protect digital information.
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
computer cyber security icon sign vector
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
This is a story about a young person experiencing extreme fear and anxiety.
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Penetration Testing Icon
Computer Problem User Composition
Cyber scanner Icon
Ethical hacker set. Character conducting a security penetration test. White
security scan icon sign vector
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
spectre and meltdown email spyware virus attack vulnerability vector illustration
Flat isometric illustration concept.  security network
Disruption Multistyle Icon Set
Risk Icon
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Cyber Security Icon Set Featuring Protection, Shield, Data, Encryption, and Firewall Concepts in a Professional, Clean, and SEO-Optimized Vector Style
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
phone virus hack icon sign vector
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Cyber security threats on smartphone. System vulnerability warning. Mobile phone hacking. Cybercrime or antivirus concept. virus, malware, ransomware, or bug. Flat cartoon icon. Vector illustration.
Protection background. Technology security, encode and decrypt, techno scheme
脆弱性診断のアイコン
Vulnerability Assessment Icon
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Security Testing Icon
Vulnerability Icon
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Risk Assessment Icon
Data breach security attack and hacker fraud problem tiny person concept
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Weak link. Broken chain or weakness concept. Broken or unleashed black chain like freedom icon. concept of lost control sign or system vulnerability or security risk. Vector illustration
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Exploit Icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Threat Detection Glyph Icon
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
thin line assess icon like review audit risk
Hacker activity icon set collection. Simple line color vector.
Weaknesses Icon
Black line icon for Vulnerability
Protection background. Technology security, encode and decrypt.
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
malware, cyber attack line vector icon
Penetration Testing icon sheet multi style collection
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Threat Assessment Icon
Internet Security Isometric Design Concept
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Penetration Testing Icon
Flat illustration of woman managing IoT security internet of things protection
Risk Management Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Cyber Security Icon
Risk management line outline icon
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Kneeling Man, SingleLine Drawing, Sorrow, Despair, Grief, Pain, Suffering, Depression, Anguish, Huma
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
malware, cyber attack or virus line icon
Broken shield icon set. Vector line icons for security, vulnerability, and risk. Unsafe protection, defense failure, and data breach concept. Cybersecurity warning alert symbol.
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
virus line icon
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
Website bug detection software security vulnerability testing and malware analysis tool
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Ethical hacker abstract concept vector illustration.
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Next page
/ 10