Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Flat illustration of data security expert inspecting security logs with alert notifications popping up
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Incident Icon
security antivirus check mark icon sign vector
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
virus line icon
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple line vector illustration.
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Vulnerability Icon
Failure Outline Icon
Black and white icon of a database server losing data protection from a cracked security shield
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Supply Chain Risk Icon
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
AI in Cybersecurity abstract concept vector illustrations.
Security Breach Icon
Escape from business crisis, recession or risk, adversity or challenge to survive danger, uncertainty or vulnerability, run away from trapped, hopeless concept, businessman escape from danger wave.
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Mental health issues concept. Flat vector illustration
Vulnerability Assessment vector icon style
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Zero Day Icon
website bug concept. errors, problems, defects or gaps contained in the website. illustration of a browser window, website symbol, and insect. symbol or icon. minimalist 3d style design. graphic
Flat illustration of woman managing IoT security internet of things protection
breach line icon
computer protection icon sign vector
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Risk icon vector image. Can be used for Compilance and Regulation.
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Failure Outline Color Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Risk Factors Icon
Cyber Threat Icon
warning on browser icon sign vector
A hand delicately pierces a balloon labeled ego, symbolizing the fragility of self-importance in a serene and minimalistic setting that evokes thought and reflection
Open Source Icon
Internet services icon collection set. Containing server web, features, higher support, authentication mechanisms, anonymous, basic access, digest icon. Simple flat vector.
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Encircling Care: A Single-Line Embrace of Vulnerability
Security warning shield indicating a potential threat or vulnerability
Ethical Hacking Icon
Zero Day Icon
Cyber Attack Line Icon Sheet
Flat illustration of man managing cybersecurity for remote work telecommuting security
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Threat Assessment Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Failure Vector  Or Logo Sign Symbol Illustration
Security Breach
Devsecops Icon
Supply Chain Risk Icon
Exploit Icon
Root Cause Icon Element For Design
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple flat vector illustration.
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Zero Day Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Sicherheitslücke finden
vulnerability cyber security system illustration lock symbol circuit broken
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Failure Vector  Or Logo Sign Symbol Illustration
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Devsecops Icon
Penetration Testing Icon
A young girl with a distressed expression, tears streaming down her cheeks, conveys sadness and vulnerability in a flat vector illustration style.
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Risk Assessment Icon Element For Design
Flat isometric illustration concept.  security network
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
Zero Day Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Next page
/ 10