Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Cracked ice floe illustration depicting fragility, climate change, and environmental issues in a vector graphic
Outline neon pc malware icon set. Glowing neon system unit and monitor screen frame with bug sign, cyber security hack pictogram. Error debug, software bugs, hacker and virus attack.
Data Breach Icon
Vector capturing a dissolving figure with a camera.
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
Vulnerability text with decimal number background
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Vulnerability Icons
ID badge next to a bug under a cloud represents digital identity, cybersecurity threats, and data protection issues. Ideal for IT, tech safety, risk management, digital ID, software vulnerabilities
Sign of Meltdown and spectre vulnerability on notebook monitor
Risk
Risk Assessment Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Cybersecurity and Data Protection Icon Set – Editable Vector Illustrations for Network Security, Firewall, Ethical Hacking, Privacy, Virus Protection, and Cybercrime Prevention
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Vulnerability Icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Secure Coding Icon
Cybersecurity threat detection vulnerability attack defense security eye bomb warning data analysis vector art illustration and png
Software quality assurance, cybersecurity firewall, system, software icon
Risk management mind map flowchart business concept for presentations and reports
Vector art of a black icon of a broken chain link, symbolizing a severed connection or a point of failure
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Risk management and financial business danger evaluation tiny person concept, transparent background.
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Vulnerability  Icon Set Multiple Style Collection
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
Supply Chain Risk Icon
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Vulnerability  Icon Set Multiple Style Collection
A diverse group of people running for their lives to escape a catastrophic tsunami wave, an illustration of survival and emergency evacuation.
Protection background. Technology security, encode and decrypt, techno scheme
Network Security Icon
Simple set of vulnerability related filled icons.
Incident Multistyle Icon Set
Virus on laptop, malware or network vulnerability vector
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
Illustration of a single clear and pristine teardrop, conveying purity and symbolizing freshness or emotional vulnerability against a white backdrop
Illustration of a broken chain link symbolizing weakness or vulnerability.
Threat Mitigation Icon
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Social volunteering or social care concept. With three illustrations of social workers helping elderly and disabled people. Flat vector illustration
Security scan flat line icon set. Security scan Thin line illustration vector
Vulnerability Assessment Multiple Style Icon Set Vector
Digital illustration depicting a polar bear standing on a fragment of melting ice.  The ice is cracked and shows water underneath. In the background, an offshore oil rig is visible. The style is
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Cybersecurity bug protection shield with circuit background for virus malware and threat detection system
Risk Management Icon
Security Testing Icon
Failure Mode Outline Icon
Secure Coding Icon
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Exploit Multistyle Icon Set
Certified Ethical Hacker - CEH - icon set & web header banner
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
computer virus icon sign vector
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
virus line icon
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Sql Injection
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Disempowerment Icon Pack Multistyle Illustration
Broken shield icon vector outline set illustration sign
System Vulnerability Icon
user protection icon sign vector
Exploit software tool. Software bug or vulnerability break out. Cyber
Cyber scanner Icon
The key to safety enhancing cyber security protections
Exploit Icon
Collection of security icons representing various aspects of online safety and data protection
Homelessness  icon .  Vector for websites, mobile interfaces, presentations, banner, visual branding etc. Vector illustration. isolated on white and black background. EPS 10
Abstract technology security on global network background, vector illustration
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
A blue cloud with a shield and servers connected by arrows representing secure data transfer network
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Abstract symbols flat design long shadow glyph icons set
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Hardening Icon
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Hardening Icon
Decryption Icon
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Next page
/ 10