Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
malware, cyber attack line vector icon
Magnifying glass searching for viruses, malware, software bugs
Cybersecurity concept with digital data servers shield and padlock icon vector illustration
Security assessment icon set multiple style collection
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Broken shield icon vector outline set illustration sign
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Virus on laptop, malware or network vulnerability vector
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple line vector.
Certified Ethical Hacker - CEH - icon set & web header banner
Isometric cybersecurity icons with warning symbols in vector art
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Protection background. Technology security, encode and decrypt, techno scheme
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
A collection of hacker-themed outline icons, showcasing technology and cybersecurity elements.
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
Login Password Laptop Composition
Risk Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
virus line icon
Security Testing Icon
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Hearing loss concept. Human ear disease or disability. Deaf person
Threat Assessment Icon
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
spectre and meltdown email spyware virus attack vulnerability vector illustration
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Threat Detection Glyph Icon
Abstract technology security  global network background, vector
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Penetration Testing Icon
Broken shield icon simple vector isolated symbol
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
A protective symbol depicting a fetus cradled within two hands representing care and life
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Internet Security Isometric Design Concept
Honeypot Icon
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
vector icon of a document with a shield with a blue background in the shape of a shield
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
unprotected
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Risk management line outline icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Software security vulnerability assessment using robots and professionals
Weakness Outline Icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
user protection icon sign vector
Vulnerability Icon
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Supply chain disruption blue and yellow brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Questrial, Lato-Regular fonts used
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Dynamic illustration of Earth facing a perilous barrage of meteors and comets, depicting an extraterrestrial threat, cosmic impact event, and environmental vulnerability
Burning brick wall cyber attack
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Magnifying Glass Inspecting Warning Sign Risk Analysis Icon
malware, cyber attack or virus line icon
Analyzing escalating risk over time, depicted with a line graph and critical alert symbol, highlighting potential vulnerabilities and warning signs for proactive business management
DDoS attack concept. Depiction of DDoS with missiles targeting a timer broad cybersecurity threats. DDoS attacks demonstrate vulnerabilities in online services. For cybersecurity campaigns, digital
Risk Icon
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Terrified person hiding under blue blankets in bed at night
Person peeking from behind a sad theatrical mask
Cybersecurity icons: password cracker, network scanner, ddos, malware, firewall bypass
Risk Blue And White Icon Style Collection
vulnerability search icon. Vector illustration
Computer software debugging concept showing magnifying glass inspecting website on laptop to find and fix security vulnerabilities.
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
computer cyber security icon sign vector
Three anime-style vector illustrations of a blindfolded woman in a black swimsuit and yellow raincoat, kneeling with head bowed, on a blue background, depicting vulnerability or contemplation.
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Inner emotional crack depicted by a seated figure with subtle fissures in the silhouette, tiny floating shards and stars suggesting vulnerability, reflection,
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
人物
Vulnerability text with decimal number background
*Stamp11
Cybersecurity crisis with businessman being monitored by invisible hacker through computer system vulnerability representing data breach risk and privacy violation in modern digital office environment
Hooded figure breaking through a digital firewall, representing a cyber attack, data breach, and security vulnerability
Crime scene on a laptop
Melancholy expression in stark black and white, showcasing vulnerability and inner turmoil
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Cybersecurity, DDoS attacks, network vulnerability, internet threats, wireless communication, online safety. wireless symbol, person analyzing data rockets labeled DDoS. Cybersecurity and DDoS
Set of vulnerability icon collection in multiple style. Icon suitable for web and mobile application
Risk Assessment Icon
Digital Security Shield on Futuristic Circuit Board.
Computer Programing icon collection set. Containing performing, cpu, computing, integration, testing, analysis, generating, algorithms, hardware and debugging icon. Simple flat vector.
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Security warning shield indicating a potential threat or vulnerability
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
Cloud security vector line icons set. Cloud, security, infrastructure, data, authentication, compliance, encryption illustration outline concept symbols and signs
Next page
/ 10