Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Cyber scanner Icon
spectre and meltdown email spyware virus attack vulnerability vector illustration
Broken shield icon vector outline set illustration sign
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Silhouette of large hand cradling seated figure in contemplative pose, emotional support and vulnerability theme illustration, transparent background graphic
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
  
Silhouettes of individuals in seated and standing postures expressing emotional distress, burden, and vulnerability
Exploit Icon
phone virus hack icon sign vector
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Solitary sadness: A depiction of sorrow and emotional vulnerability in minimalist style illustration on white background
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Protection background. Technology security, encode and decrypt, techno scheme
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
mental breakdown concept illustrating psychological stress and emotional vulnerability for mental health awareness campaigns
Hooded figure using ai robot laptop symbolizing artificial intelligence in cybersecurity, hacking, and data threats
Risk Assessment Icon
Security Testing Icon
Security Scan Icon
Vulnerability Icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
a somber depiction of a child in a seated crouching position head bowed conveying feelings of sadness and vulnerability silhouette
Silhouettes of person in progressive crouched postures, illustrating emotional descent, distress, and vulnerability
Digital lock protect data flow in global network
malware, cyber attack line vector icon
Zero Day Multistyle Icon Set
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Illustration of a giant fist looming over a small man, symbolizing power imbalance, oppression, or challenge, isolated on on transparent background
Line art illustration of a broken chain depicting disconnection for concepts of vulnerability
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Hooded figure using ai robot laptop symbolizing artificial intelligence in cybersecurity, hacking, and data threats
Collection of black human silhouettes in various crouching and sitting poses Keywords: silhouette, people, human, figure, man
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Flat illustration of woman managing IoT security internet of things protection
Risk Assessment Icon Set Multiple Style Collection
Risk Icon
Security warning shield indicating a potential threat or vulnerability
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Cyber threat Icon
malware, cyber attack or virus line icon
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Man stealing chip and running away. Hacker stealing technology. Concept of data breach, file hacking, computer security vulnerability, or cybercrime. Vector illustration
vulnerability line icon
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
A striking red heart pierced by a bold arrow illustrates the concept of love passion and vulnerability
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
vector icon of a document with a shield with a blue background in the shape of a shield
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Hooded figure using ai robot laptop symbolizing artificial intelligence in cybersecurity, hacking, and data threats
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Honeypot Icon
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
security breach alert
Risk management line outline icon
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
risk management asset vulnerability assessment concept
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
unprotected
Csrf Icon Multi Color Vector Illustration
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Modern minimalist line icons for cyber security, data protection, and internet privacy, ideal for secure digital technology and online safety infographics
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Cybersecurity threat concept with syringe injecting malware into computer chip, data breach risk, digital attack, virus protection, vector design element
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Hooded figure using ai robot laptop symbolizing artificial intelligence in cybersecurity, hacking, and data threats
Certified Ethical Hacker - CEH - icon set & web header banner
breach cyber security system concept illustration
Abstract technology security on global network background, vector illustration
Security Vulnerabilities Flat Icon
Risk Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Illustration of a single clear and pristine teardrop, conveying purity and symbolizing freshness or emotional vulnerability against a white backdrop
computer cyber security icon sign vector
Outline Hacker Attack. Isometric Cyber Security Concept.
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Print
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Security icons set vector with shadows on white background
Stick figures depicting stages of illness or declining health and wellbeing
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Supply Chain Risk Icon
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Abstract technology security  global network background, vector
Next page
/ 10