Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Ethical hacker set. Character conducting a security penetration test. White
phone virus hack icon sign vector
Internet Security Isometric Design Concept
Protection background. Technology security, encode and decrypt, techno scheme
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Security Testing Icon
Risk Assessment Icon
Risk management and financial business danger evaluation tiny person concept, transparent background.
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Simple set of vulnerability related filled icons.
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Vulnerability Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Digital lock protect data flow in global network
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Exploit Icon
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Security Scan Icon
Certified Ethical Hacker - CEH - icon set & web header banner
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Cybersecurity Network Protection Diagram with Central Lock Icon for Data Security and Digital Privacy Compliance
Cyber Security Icon
Illustration of a giant fist looming over a small man, symbolizing power imbalance, oppression, or challenge, isolated on on transparent background
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
malware, cyber attack line vector icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Hacker icon set multiple style collection
Strength versus weakness icon set. Protection vs vulnerability concept. Power, muscle, strong arm. Fragile, broken stick. Shield for defense, security. Cracked shield for risk, damage.
Flat illustration of woman managing IoT security internet of things protection
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Risk Icon
Businessman tempted by an email message placed inside a dangerous bear trap to illustrate the serious risks of online phishing and cybercrime.
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Security warning shield indicating a potential threat or vulnerability
Blockchain security line icon set. Editable stroke. Vector illustration
Risk Assessment Icon Set Multiple Style Collection
an elderly woman coughing with virus particles spreading in the air. The image highlights health risks, virus transmission, and vulnerability of seniors to infectious diseases. Suitable for healthcare
Minimalist black and white silhouette illustration of a woman hugging herself depicting introspection self-care or emotional vulnerability
A dramatic illustration depicts a collapsing electricity pylon and damaged power lines during a severe storm, symbolizing infrastructure vulnerability and power outages.
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Phishing Icon Different Style Outline Collection Set Vector Illustration
vulnerability line icon
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
A striking red heart pierced by a bold arrow illustrates the concept of love passion and vulnerability
malware, cyber attack or virus line icon
vector icon of a document with a shield with a blue background in the shape of a shield
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
unprotected
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Risk management line outline icon
Honeypot Icon
risk management asset vulnerability assessment concept
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Adorable blue duck cartoon character with a yellow beak shedding tears, symbolizing deep sadness, distress, or a moment of grief and emotional vulnerability
Csrf Icon Multi Color Vector Illustration
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Split-screen concept comparing a system error or vulnerability with a secure, protected system managed by IT professionals.
user protection icon sign vector
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Cracked camouflage shield icon representing broken defense, security vulnerability, and conflict challenges
Collection of cracked shield line icons, symbolizing broken security, vulnerability, and data breaches, presented in a clean vector cartoon style on a white background, ideal for digital security
A striking red heart pierced by an arrow symbolizes love passion and perhaps a touch of vulnerability
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Cybersecurity threat concept with syringe injecting malware into computer chip, data breach risk, digital attack, virus protection, vector design element
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Risk Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Security Vulnerabilities Flat Icon
Continuous single line drawing of a shield with a triangular warning sign and a question mark inside, representing concepts of unknown risk, security uncertainty, and vulnerability
Illustration of a single clear and pristine teardrop, conveying purity and symbolizing freshness or emotional vulnerability against a white backdrop
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Striking black and white cracked circle graphic, evocative of a fractured eye or a damaged target, representing rupture, stress, and vulnerability in design
Abstract technology security  global network background, vector
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Print
Stick figures depicting stages of illness or declining health and wellbeing
computer cyber security icon sign vector
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Risk Icon
A hand reaching for a bright pink credit card digital security concept
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Supply Chain Risk Icon
Warning of a cryptocurrency bridge security compromise. Vector illustration shows a broken digital connection with an alert sign, symbolizing network vulnerabilities and blockchain risks
Security concept with magnifying glass examining bug on shield icon symbolizing protection and vulnerability scanning
Three hooded figures working on laptops in a dimly lit digital environment
System administrator online service or platform. Technical work with server
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Next page
/ 10