Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Illustration of a cyber attack: damaged shield on computer, surrounded by warnings, crossed documents, and a broken lock.
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Detection Icon
Recognizing elder abuse, physical, psychological, economic, and environmental signs
phone virus hack icon sign vector
Negletful Parenting Style. Flat Vector Illustration
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Penetration Testing Icon
Broken padlock on a laptop screen representing data vulnerability and hacking
Risk Icon
Website bug detection software security vulnerability testing and malware analysis tool
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Security shields showing vulnerability and protection flat vector illustration
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
 risk
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Network Defense Icon
Data Breach Icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Risk Icon
Create a striking icon depicting a hooded figure, shrouded in shadow, hunched over a laptop, subtly suggesting hacking activity.
user protection icon sign vector
Failure Mode Outline Icon
A cracked shield symbolizes vulnerability and exposed weakness.
Cyber threat Icon
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Security shield with exclamation mark warning icon
Protection and Security Concept
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Zero Day Icon
Cybersecurity Icons Data Protection, Privacy, and Network Security
System Vulnerability Icon
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Insider Threat Vector Icon. Person silhouette behind a damaged shield, internal security risk, isolated sketch for cybersecurity, data breach prevention, IT
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
Secure Coding Icon
Vulnerability Assessment icon
CyberSafe Shield Digital Security, Data Protection, Privacy
Weakness Outline Icon
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Broken heart symbol, emotional pain icon, heartbreak graphic, love loss representation, sorrowful feelings image
Vulnerability Assessment Icon
Broken shield icon Simple thin outline
broken lock line icon
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
System Vulnerability Icon
Hacker activity icon set collection. Simple line vector.
Vector icon of a broken chain link symbolizing disconnect and separation
Risk Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Cyber threat Icon
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Configuration Vulnerability Assesement
Honeypot Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Vulnerability Flat Icon
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Risk Assessment Icon Set Multiple Style Collection
vulnerability line icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
System Vulnerability Icon
Data Leak icon vector image. Can be used for Compilance and Regulation.
Data security with chart and lock icon illustration
A shield with cracks symbolizes vulnerability and resilience.
Emotional Vector Illustration of Sad Lonely Teenager Girl Sitting Alone with Knees Pulled to Chest, Minimalist Depression and Anxiety Concept for Mental Health Awareness, Youth Psychology Graphic
Penetration Testing Icon
Vulnerability Icon
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
Breach Icon
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
document security icon sign vector
Hacker activity icon set collection. Simple color fill vector.
Lock and skull signifying cyber threats, gear symbolizing system operations. Ideal for security, hacking, IT systems, network protection, software vulnerabilities, data breaches, simple landing page
motional and Psychological Support: A Journey from Grief to Healing
Security Patch Vector Icon. Shield with an adhesive bandage, fixing software vulnerabilities, isolated sketch for cybersecurity, updates, system maintenance
Weakness Icon Set With Multiple Style Collection
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Risk  Outline Icon
Login Password Laptop Composition
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
System Vulnerability Icon
Risk Icon
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Next page
/ 10