Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Software Testing Debugging Flat Icons - Red Line Art Style - Checklist Gear Wrench Bug Computer Browser
Bug Bounty Icon with Beetle Design on Transparent Background
Risk Icon
Data Breach Icon
Penetration Testing Icon
Vulnerability Vector Design
Weakness Identification icon set multiple style collection
Penetration Testing Icon
thin line assess icon like review audit risk
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
A minimal set of 24 solid glyph icons representing cybersecurity, data privacy, and network protection concepts for technology
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
lock With Keyhole on digital data background
脆弱性診断のアイコン
Vulnerability Assessment Icon
Security Icon
Black line icon for Vulnerability
Threat Assessment Icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Hacker in a mask
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
System Vulnerability Icon
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Ethical hacking and cybersecurity icon set for security, featuring hacker, data protection, and network threat symbols for digital defense, white hat operations, and vulnerability assessment.
Cybersecurity concept with a hooded hacker typing on a keyboard, surrounded by glowing digital screens displaying code and a prominent padlock icon, symbolizing internet crime and data protection in
Weakness Outline Icon
Cybersecurity Icon Set collection with antivirus, password and internet icon
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Security Icon
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Risk icon vector image. Can be used for Compilance and Regulation.
Protection background. Technology security, encode and decrypt.
Isometric cybersecurity icons with warning symbols in vector art
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
Security assessment icon set multiple style collection
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Maintenance smartphone technology search system
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Risk Management Icon
Threat Detection icon set multiple style collection
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Software security vulnerability assessment using robots and professionals
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Security Testing Icon
virus line icon
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Ink Portrait: Youthful Woman with Freckles, Looking Upward, Expressive Gaze.
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Malware icon with long shadow
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Computer Problem User Composition
Finger pointing at cyber security lock
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Analytics Icon
wind damage icon sign vector
Man and woman couple shivering from low temperature at home feeling frozen due to lack of heating
Threat Detection Glyph Icon
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Sicherheitslücke finden
Risk management and financial business danger evaluation tiny person concept, transparent background.
Security scan flat line icon set. Security scan Thin line illustration vector
A versatile set of triangular warning sign icons in yellow, red, and black, representing concepts of caution, danger, and critical system alerts
Cyber Security Icon
Simple set of vulnerability related filled icons.
Certified Ethical Hacker - CEH - icon set & web header banner
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Security breach response black icons set, cyber attack and data incident management symbols
Thirty hand drawn doodle style icons representing various crucial elements of comprehensive security governance and data protection strategies
Cybersecurity process: identify, protect, detect, respond, recover
Login Password Laptop Composition
Cloud security vector line icons set. Cloud, security, infrastructure, data, authentication, compliance, encryption illustration outline concept symbols and signs
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Blockchain security line icon set. Editable stroke. Vector illustration
Penetration Testing Icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Ethical hacker set. Character conducting a security penetration test. White
Hooded figure using ai robot laptop symbolizing artificial intelligence in cybersecurity, hacking, and data threats
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Trojan horse concept. Trojan horse as a geometric figure with an arrow and binary-thumbs up elements, digital cyber threats. Trojan concept for cybersecurity, malware, system safety, network
Next page
/ 10