Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Icono escudo alarma color FB reflejo
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Frayed rope symbolizes tension and potential breaking point.
Supply Chain Risk Icon
Risk Icon
Hacker in a dark hoodie stealing confidential data from a laptop computer folder. Cyber attack, internet crime, phishing, and online fraud concept. Torn paper sticker vector.
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
*Stamp11
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Security scan flat line icon set. Security scan Thin line illustration vector
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Programmer at work. Computer assisted design, developer testing program.
脆弱性を表すパズル
vulnerability line icon
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
Risk Assessment Icon
Cybersecurity concept warning on hacker laptop
Certified Ethical Hacker - CEH - icon set & web header banner
Hacker activity icon set collection. Simple line color vector.
Security Breach Icon
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Threat Assessment Icon
risk management asset vulnerability assessment concept
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Risk management process, business vector concept
Computer security specialist online service or platform set. Idea of digital
Bug Icon
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Illustration of two people, one holding a key and the other a tablet, near a secure vault.
Protection background. Technology security, encode and decrypt, techno scheme
Risk Icon Set With Multiple Style Collection
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
virus line icon
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Broken padlock icon symbolizing security breach vulnerability and unauthorized access representing a critical failure in data protection
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
Security Vulnerabilities Flat Icon
Magnifying Glass Inspecting Warning Sign Risk Analysis Icon
Vulnerability Outline Icon
Hands Holding Earth in Minimalist Illustration for Environmental Awareness
Cybersecurity and privacy thin line icons set data protection and network security
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Ethical hacker abstract concept vector illustration.
Ethical hacker. Character conducting a security penetration test. White
Cybersecurity concept warning on hacker laptop
Green boxing glove striking a user profile icon below a minimalist cloud, symbolizing cyber threats, privacy, conflict, strength, security, vulnerability. Ideal for risk, protection simple flat
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Cyber Security Icon
Person collapsing and a fractured head icon representing mental breakdown
user protection icon sign vector
Outline neon pc malware icon set. Glowing neon system unit and monitor screen frame with bug sign, cyber security hack pictogram. Error debug, software bugs, hacker and virus attack.
Cyber security threats on smartphone. System vulnerability warning. Mobile phone hacking. Cybercrime or antivirus concept. virus, malware, ransomware, or bug. Flat cartoon icon. Vector illustration.
Computer Problem User Composition
Dark Web Hacker Deal: Cyber Crime, Online Fraud, Data Breach. Anonymous Criminal Buying Stolen Information. Internet Security Concept. Digital Piracy and Cyber Attack.
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Data Breach Alert Silhouette Icon
An illustration of a solitary senior man sitting pensively on a park bench
The concept of secure system and network protection technology. Cybersecurity technology background. For banners and templates.
Secure Icon Matrix. Secure Setup Set linear set: config matrix, authentication key, encryption lock, protocol setting icon, secure parameter tile, vulnerability scan marker,
Understanding and preventing computer viruses and malware threats to digital security
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
User silhouette with open padlock symbol, sketch hand drawn privacy concept. Vector illustration
System administrator online service or platform. Technical work with server
DNA Helix Disintegrating into Black Awareness Ribbon. Symbol of Genetic Disease, Loss, and Remembrance Vector Illustration.
Cyber Security icon collection set. Simple color fill vector illustration.
Risk management mind map flowchart business concept for presentations and reports
Security Audit multiple icon
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Software quality assurance, cybersecurity firewall, system, software icon
Broken shield icon Simple thin outline
Security shield with exclamation mark warning icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Vulnerability Multistyle Icon Set
Protection background. Technology security, encode and decrypt, techno scheme
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Abstract technology security  global network background, vector
Illustrative fractured USB stick, highlighting digital security vulnerabilities
Four Children Sitting Alone, Depressed Line Art Illustration
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Abstract symbols linear icons set
Cyber threat word concept isolated on white. Access management, system hacking. Software vulnerability. Creative illustration banner surrounded by editable line colorful icons. Hubot Sans font used
Next page
/ 10