Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Risk  Outline Icon
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Collection of broken shields with cracks and damage, symbolizing vulnerability and failure.
Risk  Icon Set Different Style Collection
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Mental health issues concept. Flat vector illustration
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Data Breach Icon
Adorable blue duck cartoon character with a yellow beak shedding tears, symbolizing deep sadness, distress, or a moment of grief and emotional vulnerability
Bug Bounty Icon with Beetle Design on Transparent Background
Vulnerability Icon
3D Isometric Cybersecurity vector icons sets Global Protection Firewall and Data Security
broken padlock glyph icon
Vulnerability Vector Design
Protection background. Technology security, encode and decrypt.
Debug icon symbol collection on white background.
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Risk Icon
An illustration of a woman hesitantly holding a smiling mask, with a speech bubble that represents mental confusion, highlighting the brave act of admitting that it's okay not to be OK.
Human factor vulnerability vector
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Penetration Testing Icon
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Malware icon with long shadow
Flat isometric illustration concept.  security network
A programmer or IT specialist analyzes a database, finding a critical error, threat, or system vulnerability with a magnifying glass
lock With Keyhole on digital data background
Threat Detection icon sheet multi style collection
Cybersecurity Specialist Investigating Data Protection With AI Powered Security Network
Security Icon
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Red Balloon Popping Needle Isolated White Background
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
spectre and meltdown email spyware virus attack vulnerability vector illustration
Risk icon sheet multiple style collection
Website security vulnerability illustration showing software bug detection
Black line icon for Vulnerability
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
malware flat gradient icon
Mitigation icon set collection in flat style. Icon pack contains mitigation, prevention, reduction, control, protection, security, planning, preparedness, management, response
A graphic symbolizing a digital security breach or vulnerability in a protective shield.
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
脆弱性診断のアイコン
Vulnerability Assessment Icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Sign of Meltdown and spectre vulnerability on notebook monitor
Cybersecurity Evaluation Process. Cyber vulnerability assessment. Professional reviewing system components with checklists and alert icons, careful and
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Threat Assessment Icon
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
vulnerability line icon
Data scientist managing cybersecurity system and network for company cloud infrastructure
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
3d shield under magnifying glass with red cross mark inside. Security failure detection, vulnerability identification, risk exposure analysis, threat diagnostics concept.
Risk icon vector image. Can be used for Compilance and Regulation.
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
System Vulnerability Icon
Penetration Testing icon sheet multi style collection
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Sicherheitslücke finden
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Virus on laptop, malware or network vulnerability vector
virus line icon
Hacker behind a wall with credit card and computer, surrounded by binary code
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Risk Management web icon set in line style. Risk analysis, risk investment, minimizing losses, plan, low cost, collection. Vector illustration.
Cybersecurity Icon Set collection with antivirus, password and internet icon
Security Icon
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
A continuous line drawing of a heart intertwined with flowing waves, representing love and fluidity in a simple illustration
Collection of eight black icons depicting padlocks in various stages of being broken or unlocked, symbolizing security breaches or access.
Broken gate symbolizing vulnerability and unauthorized access shown as a simple fence with one panel tilted open and a small warning triangle nearby,
Support,Group,Trust,Motivation, multiple style icon set.
Simple set of vulnerability related filled icons.
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
risk management asset vulnerability assessment concept
Security scan flat line icon set. Security scan Thin line illustration vector
Next page
/ 10