Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Risk Management Icon
Csrf Icon Multi Color Vector Illustration
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Honeypot Icon
Penetration Testing icon sheet multi style collection
malware, cyber attack or virus line icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
vulnerability line icon
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
A versatile set of triangular warning sign icons in yellow, red, and black, representing concepts of caution, danger, and critical system alerts
vector icon of a document with a shield with a blue background in the shape of a shield
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
unprotected
Risk Icon
Risk management line outline icon
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
risk management asset vulnerability assessment concept
computer cyber security icon sign vector
virus line icon
Disruption Multistyle Icon Set
Bug Icon
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Cybersecurity threat concept with syringe injecting malware into computer chip, data breach risk, digital attack, virus protection, vector design element
Sicherheitslücke finden
Cyber Security Icon
Risk management and financial business danger evaluation tiny person concept, transparent background.
Simple set of vulnerability related filled icons.
Broken padlock icon symbolizing security breach vulnerability and unauthorized access representing a critical failure in data protection
Security Vulnerabilities Flat Icon
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Security shield with exclamation mark warning icon
Abstract technology security  global network background, vector
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Ethical hacker abstract concept vector illustration.
Print
Certified Ethical Hacker - CEH - icon set & web header banner
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Supply Chain Risk Icon
Risk Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Social volunteering or social care concept. With three illustrations of social workers helping elderly and disabled people. Flat vector illustration
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
System administrator online service or platform. Technical work with server
Close-up portrait of a hamster with tears on its face, showing distress and vulnerability
Programmer at work. Computer assisted design, developer testing program.
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
Risk icon set multiple style collection
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Secure Icon Matrix. Secure Setup Set linear set: config matrix, authentication key, encryption lock, protocol setting icon, secure parameter tile, vulnerability scan marker,
Despondent man illustration showing feelings of solitude and despair in grayscale color palette, conveying sadness and vulnerability in a minimalist
an elderly woman coughing with virus particles spreading in the air. The image highlights health risks, virus transmission, and vulnerability of seniors to infectious diseases. Suitable for healthcare
Set of six minimalist warning icons simple flat vector design element isolated on white background
Mitigation icon set collection in flat style. Icon pack contains mitigation, prevention, reduction, control, protection, security, planning, preparedness, management, response
Cybersecurity concept warning on hacker laptop
Illustrative fractured USB stick, highlighting digital security vulnerabilities
Vulnerability Multistyle Icon Set
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Business IT Security Concept Design, Mesh of Connected Network Client Nodes
Risk management process, business vector concept
Weaknesses Icon
Mitigation Plan Icon Collection and Simple Concept Outline Color, Containing: Climate Change,Green Environment,Evacuation Plan,Ecology,Reduction,Notification,Community,Task List,Disaster Recovery
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Cyber security threats on smartphone. System vulnerability warning. Mobile phone hacking. Cybercrime or antivirus concept. virus, malware, ransomware, or bug. Flat cartoon icon. Vector illustration.
Ethical hacker. Character conducting a security penetration test. White
Cybersecurity process: identify, protect, detect, respond, recover
Virus on laptop, malware or network vulnerability vector
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
A young woman with long black hair is expressing sadness and sorrow in an interior setting, conveying a sense of emotional distress and vulnerability
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Risk Management Icon Set Multiple Style Collection
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Vulnerability Check icon set multiple style collection
A security shield with an exclamation point, symbolizing vulnerability.
Risk Assessment Icon
Cybersecurity concept warning on hacker laptop
Magnifying Glass Inspecting Warning Sign Risk Analysis Icon
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Stages of a cybercrime infographic 5 steps. System vulnerability, digital service. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used
Cyber threat word concept isolated on white. Access management, system hacking. Software vulnerability. Creative illustration banner surrounded by editable line colorful icons. Hubot Sans font used
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Computer security specialist online service or platform set. Idea of digital
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Next page
/ 10