Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Cracked ice floe illustration depicting fragility, climate change, and environmental issues in a vector graphic
Ethical hacker. Character conducting a security penetration test. White
Outline neon pc malware icon set. Glowing neon system unit and monitor screen frame with bug sign, cyber security hack pictogram. Error debug, software bugs, hacker and virus attack.
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Data Breach Icon
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Vector capturing a dissolving figure with a camera.
Vulnerability text with decimal number background
Black line icon for Vulnerability
Vulnerability Icons
Sign of Meltdown and spectre vulnerability on notebook monitor
Risk Assessment Icon
ID badge next to a bug under a cloud represents digital identity, cybersecurity threats, and data protection issues. Ideal for IT, tech safety, risk management, digital ID, software vulnerabilities
Risk
Threat Assessment Icon
Cybersecurity and Data Protection Icon Set – Editable Vector Illustrations for Network Security, Firewall, Ethical Hacking, Privacy, Virus Protection, and Cybercrime Prevention
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Vulnerability Icon
Secure Coding Icon
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Cybersecurity threat detection vulnerability attack defense security eye bomb warning data analysis vector art illustration and png
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
Software quality assurance, cybersecurity firewall, system, software icon
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Risk management mind map flowchart business concept for presentations and reports
Vector art of a black icon of a broken chain link, symbolizing a severed connection or a point of failure
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Vulnerability  Icon Set Multiple Style Collection
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Supply Chain Risk Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Vulnerability  Icon Set Multiple Style Collection
Network Security Icon
A diverse group of people running for their lives to escape a catastrophic tsunami wave, an illustration of survival and emergency evacuation.
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Incident Multistyle Icon Set
Illustration of a broken chain link symbolizing weakness or vulnerability.
Virus on laptop, malware or network vulnerability vector
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
Illustration of a single clear and pristine teardrop, conveying purity and symbolizing freshness or emotional vulnerability against a white backdrop
Threat Mitigation Icon
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Social volunteering or social care concept. With three illustrations of social workers helping elderly and disabled people. Flat vector illustration
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Vulnerability Assessment Multiple Style Icon Set Vector
Digital illustration depicting a polar bear standing on a fragment of melting ice.  The ice is cracked and shows water underneath. In the background, an offshore oil rig is visible. The style is
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Cybersecurity bug protection shield with circuit background for virus malware and threat detection system
Risk Management Icon
Secure Coding Icon
Security Testing Icon
Failure Mode Outline Icon
Protection background. Technology security, encode and decrypt, techno scheme
Exploit Multistyle Icon Set
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Simple set of vulnerability related filled icons.
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
Security scan flat line icon set. Security scan Thin line illustration vector
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Certified Ethical Hacker - CEH - icon set & web header banner
computer virus icon sign vector
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
virus line icon
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Sql Injection
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Disempowerment Icon Pack Multistyle Illustration
System Vulnerability Icon
Exploit Icon
user protection icon sign vector
Exploit software tool. Software bug or vulnerability break out. Cyber
Risk  Outline Icon
Abstract technology security on global network background, vector illustration
Risk management and financial business danger evaluation tiny person concept, transparent background.
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Abstract symbols flat design long shadow glyph icons set
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Hardening Icon
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Hardening Icon
Broken shield icon vector outline set illustration sign
Next page
/ 10