Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Mutual Support Giving up seat in public transport -modern flat vector concept illustration of man offering his seat to elderly woman on bus A metaphor of voluntary, collaborative exchanges of services
Vulnerability Assessment vector icon style
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline concept vector illustrations
security document icon sign vector
Camping Bundle. Apocalyptic City Destruction Collection Stickers
QR code and tag on a smartphone beside a geometric Trojan horse and metadata tag. Ideal for cybersecurity, data encryption, digital banking, vulnerability awareness, digital threats, online payments
Security analysis or risk assessment, vulnerability assessment or threat detection, security audit or compliance check, data protection or encryption evaluation, network security or perimeter defense,
A fractured planet's core exposed, revealing internal struggles and vulnerability amidst vibrant, striped tectonic plates.
Application security practices infographic 5 steps. Threat management, access control. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used
Risk Factor Glyph Blue Grey Icon
Exploit Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Two women sharing a heartfelt moment of support in flat vector art
Botnet Icon
Two people fixing cybersecurity issues on a large screen with charts, warning signs, and hacker icons. Digital security and system maintenance concept. Vector illustration
Malware spyware virus. Vector illustration. Alerts notify users potential security breaches and malware threats Bugs in software ccreate vulnerabilities hackers exploit Hacking attempts on internet
A Man in Despair Seated on the Ground Holding a Cup in a State of Poverty and Need for Charity
Security Icon
In a quiet indoor setting, a handsome man with blue hair is thoughtfully holding his head in a contemplative posture. His expression reveals deep emotion, with a hint of sadness.
Shield Slash Outline Icon
Computer chip with insect represents cyber security vulnerability concept
Online scam alert. Distressed man victim of cybersecurity threat, hacker on smartphone. Phishing, malware bug, data theft. Internet fraud, digital vulnerability, online safety, tech support concept.
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Cracked Egg Shell, Broken Eggshell, Simple Illustration
Insider Threat Icon
Risk Icon
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Detection vulnerability illustration of system bugs and network threats
Black Silhouette of a Hedgehog – Rounded Body with Spiky Back, Sharp Quills, Small Face, and Tiny Legs, Symbolizing Cuteness, Nature’s Resilience, and the Innocence of Forest Wildlife
Security Outline Color Icon
Zero Day Icon
Vector set of 16 linear icons related to human behavior and mental conditions. Mono line pictograms and infographics design elements
System Vulnerability Icon
Patching Icon
 Comprehensive Vulnerability Icon for Protection
image of a sad girl
Hacker or Coder Icon with Hoodie and Laptop
Insecure Icon
Pleading Face Emoji
Boites carton déménagement
Data Breach Icon Represents Security Vulnerability with Link Symbol
Risk Vector Design Icon Style
Hybrid Intrusion monitoring and detection concept, Real-time adaptive security vector design, Web hosting service Symbol, Computing machines Sign, Internet Application Management stock illustration
Hacker in the Shadows: An anonymous figure in a hooded sweatshirt intensely focused on a computer, symbolizing cybersecurity threats and digital crime in the digital realm.
mortality death life aging icons set vector
Penetration Testing Icon
shield X line icon
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Maintenance smartphone technology search system
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple flat vector illustration.
Zero Day Icon
Trapped and Needing Help
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Hardening Icon
 Vulnerability Icon for Risk Assessment
Risk Management Framework icon set in Flat Line style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
email with virus, phishing vector icon
Cloud computing security breach for internet of things
Penetration Testing or pen test to analyze a potential cyber attack or find hacker to hack password
Sad boy crying holding teddy bear in yellow shirt vector illustration
Exposure Icon
Disempowerment Glyph Blue Grey Icon
Shield on a futuristic digital background. Concept of cybersecurity, antivirus protection and secure data transfer in a high-tech environment. Protection of information and Internet projects.
Risk Management Icon
mortality death life aging icons set vector
Online Robbery Icon
A minimalist sketch of a figure sitting in a posture of sadness and isolation.
Single transparent shrimp against deep blue ocean, minimalist composition.
Risk Icon
51 Attack Outline Icon
Exploit Icon
The Impact of Cyberbullying
Flat illustration of woman developing secure software with security shield and programming code
Patch Icon
 Vulnerability Scanner Technology Icon
Risk Management Framework icon set in Mixed style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
1045 - Data Leak Concept Illustration
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Firewall Breach Vector Illustration Concept of Network Security Attack
Abstract symbols web banner templates set
Businessman using hypnosis with pendulum to influence employee. Vector concept of corporate manipulation, mind control, persuasion, suggestion, trance, compliance, and workplace power dynamics.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Hardening Icon
Vulnerability Icon
Vulnerability Icon
50 cybersecurity icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Eavesdropping Icon
Vulnerability Icon
Vulnerability Icon
Vulnerability Icon
Honeypot Icon
Exploit Icon
Zero Day Icon
Exploit Icon
Exploit Icon
Zero Day Icon
mortality death life aging icons set vector
Exploit Icon
Parental Conflict and Child Impact
Next page
/ 10