Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Outline neon pc malware icon set. Glowing neon system unit and monitor screen frame with bug sign, cyber security hack pictogram. Error debug, software bugs, hacker and virus attack.
Risk Icon
Computer Problem User Composition
Vulnerability Multiple Style Icon Set Vector
Cybersecurity vector icon set. Digital protection, security and vulnerability concepts. Includes shield, virus, malware, bug, network attack, phone warning, and hack symbols.
Security Vulnerabilities Flat Icon
Cybersecurity and Data Protection Icon Set – Editable Vector Illustrations for Network Security, Firewall, Ethical Hacking, Privacy, Virus Protection, and Cybercrime Prevention
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Risk management and financial business danger evaluation tiny person concept, transparent background.
System administrator online service or platform. Technical work with server
A digital illustration depicting a stylized cityscape partially submerged in water. The buildings are rendered in shades of blue and gray, with varying heights and shapes, suggesting a modern or
Software quality assurance, cybersecurity firewall, system, software icon
Certified Ethical Hacker - CEH - icon set & web header banner
Network Security Icon
Protection background. Technology security, encode and decrypt, techno scheme
Supply Chain Risk Icon
Risk management mind map flowchart business concept for presentations and reports
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
A security shield with an exclamation point, symbolizing vulnerability.
A sleek black and white vector icon depicting a wine glass with a visible crack  symbolizing breakage or damage. Perfect for designs related to fragility  accidents  loss  or vulnerability
Risk
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Abstract technology security  global network background, vector
Threat Assessment Icon
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Business IT Security Concept Design, Mesh of Connected Network Client Nodes
Print
Computer Programing icon collection set. Containing performing, cpu, computing, integration, testing, analysis, generating, algorithms, hardware and debugging icon. Simple flat vector.
Patch Management Icon Lineal Syle
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Cybersecurity intelligence line icons collection. Threats, Breaches, Hacks, Malware, Vulnerabilities, Pentesting, Encryption vector and linear illustration. Firewalls,Intrusion,Phishing outline signs
Zero Day Icon
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
Adobe Illustrator Artwork
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
A diverse group of people running for their lives to escape a catastrophic tsunami wave, an illustration of survival and emergency evacuation.
Supply chain disruption blue brochure template. Leaflet design with linear icons. Editable 4 vector layouts for presentation, annual reports. Arial-Black, Myriad Pro-Regular fonts used
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Hacker activity icon set collection. Simple line vector.
Secure Coding Icon
Protección de las personas mayores o tercera edad.
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Finger pointing at cyber security lock
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Security Testing Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Vulnerability search. SEO optimization,web analytics, programmin
Social volunteering or social care concept. With three illustrations of social workers helping elderly and disabled people. Flat vector illustration
Protection background. Technology security, encode and decrypt, techno scheme
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Vulnerability Outline Icon
Digital illustration depicting a polar bear standing on a fragment of melting ice.  The ice is cracked and shows water underneath. In the background, an offshore oil rig is visible. The style is
Penetration Testing Icon
Unhappy person floating on the kitchen pot, vector cartoon stick figure or character illustration.
Illustration of a broken chain link symbolizing weakness or vulnerability.
Root Cause Icon Element For Design
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Security scan icons set in black filled and stroke line style
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Exploit Icon
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Failure Mode Outline Icon
Vulnerability text with decimal number background
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Bug fixing doodle for improve website performance
Vulnerability Icons
Incident Multistyle Icon Set
Sign of Meltdown and spectre vulnerability on notebook monitor
Security Icon
Penetration Testing Icon
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Simple set of vulnerability related filled icons.
Recognizing elder abuse, physical, psychological, economic, and environmental signs
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
computer virus icon sign vector
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Hardening Icon
Risk Assessment Icon Element For Design
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Risk Assessment Icon
Broken shield icon vector outline set illustration sign
Kneeling Man, SingleLine Drawing, Sorrow, Despair, Grief, Pain, Suffering, Depression, Anguish, Huma
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Flat illustration of man performing penetration testing ethical hacking and improving security
ID badge next to a bug under a cloud represents digital identity, cybersecurity threats, and data protection issues. Ideal for IT, tech safety, risk management, digital ID, software vulnerabilities
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Exploit Multistyle Icon Set
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Hardening Icon
Decryption Icon
Cyber scanner Icon
Next page
/ 10