Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Zero Day Icon
Weakness Outline Icon
Risk Assessment Icon
Penetration Testing Icon
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Different types of cyber attacks, hacking and malware concepts represented by colorful icons
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Risk Icon
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Vulnerability Icon
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Cracked plate symbolizing fragility, broken dreams, and unexpected setbacks
Vulnerability Icon
virus in mail icon sign vector
Risk Factors Icon
Cyber Attack Line Icon Sheet
Virus Infected icon in vector. Logotype
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Failure Mode Flat Icon
vulnerability cyber security system illustration lock symbol circuit broken
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Neon half tone shield representing vulnerability in digital world with glowing lines
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Risk Icon
ネットワークセキュリティのイメージイラスト
Sicherheitslücke finden
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Penetration Testing icon vector image. Can be used for Business Audit.
Bankruptcy Risk Icon
The program offers a safe space for individuals to share their vulnerabilities and receive understanding and validation from their peers.. Vector illustration
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Penetration Testing Icon
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Exploit Icon
Zero Day Blue Icon
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
Vulnerability Icon
Cyber scanner Icon
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Flat illustration of woman managing IoT security internet of things protection
Risk Icon
Mental health issues concept. Flat vector illustration
Risk Factors Icon
Open Source Icon
Depiction of a man expressing intense emotion with liquid dripping down his face and neck against a dark background
Emotional Vulnerability Icon
Vulnerability Icon
Flat isometric illustration concept.  security network
Exploitation Icon
Hacked line icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
User Interface Security Icons Privacy, Protection, and Access Control
Exploit Icon
Zero Day Flat Icon
 Risk
Virus on laptop, malware or network vulnerability vector
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Magnifying glass is being used to closely examine a computer bug, highlighting the concept of identifying and resolving software vulnerabilities
thin line assess icon like review audit risk
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Risk Icon
Single transparent shrimp against deep blue ocean, minimalist composition.
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Open Source Icon
Learning about self, A figure stands atop an oversized hand, showcasing a harmonious blend of strength and vulnerability, inner work concept
A shield with a spine and cracks symbolizes vulnerability and fragility.
Bankruptcy Risk Icon
broken padlock glyph icon
Abstract technology security on global network background, vector illustration
Vulnerability Management and analysis security hacker
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple color vector
Hacker activity icon set collection. Simple line color vector.
Exploit Icon
Weakness Dual Tone Icon
Risk
Security Testing Icon
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Internet Security Isometric Design Concept
Risk Icon
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Digital security solutions help businesses mitigate cyber vulnerabilities (4).eps
Trust Ladder A ladder where the rungs are made of hearts with a leader helping a team member climb symbolizing how vulnerability helps build a foundation of trust.
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Ethical hacker abstract concept vector illustration.
Weakness Icon
spectre & meltdown processor bugs - cyber security vulnerability
An illustration of a hacker infiltrating a secure system, exploiting vulnerabilities to gain unauthorized access, emphasizing the importance of strong cybersecurity.
handicap
Next page
/ 10