Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Security Breach Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Vector illustration of secure software development life cycle showing code audit, vulnerability testing, and signed deployment
Ethical Hacking Icon
Infrastructure Security Lineal Icon Vector Illustration
Computer screen with skull symbol warning security vulnerability alert
Shield with X icon in trendy flat style. Vulnerability symbol for your web site design, logo, app, UI Vector EPS 10.
patch update dual tone
Vulnerability Assessment Icon
Illustration of a cyber attack: damaged shield on computer, surrounded by warnings, crossed documents, and a broken lock.
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
unprotected
Risk management line outline icon
Solid black icon for Vulnerability
Risk Assessment Icon
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Penetration Testing icon vector image. Can be used for Business Audit.
Cybersecurity Icon
data and document protection
Flat illustration of man managing cybersecurity for remote work telecommuting security
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
脆弱性診断のアイコン
Vulnerability Assessment Icon
Line style icons of emotional recovery: tears and safety symbol, safe cry zone, emotional release icon, soft tissue icon, open hand icon, “allow feeling” symbol, vulnerability shield, tear with heart
Programmer at work. Computer assisted design, developer testing program.
Security Lineal Icon Vector Illustration
Computer chip with insect represents cyber security vulnerability concept
Patch software. Operating system updates that address security vulnerabilities
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
A man comforts a distressed woman, expressing empathy and understanding during a heartfelt conversation.
patch update line
Abstract symbols linear icons set
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Vector illustration of a globe with an open padlock symbolizing internet access, online security breach, and global data vulnerability
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
A stylized illustration vividly depicting an individual who is expressing profound sadness and emotional vulnerability
Malware icon with long shadow
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Cybersecurity Icon
Crime scene on a laptop
Vector outline unlocked padlock icon representing security vulnerabilities
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Security Solid Icon Vector Illustration
Website security vulnerability with skull symbol warning icon
Protection background. Technology security, encode and decrypt, techno scheme
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Security Vulnerabilities Outline Color Icon
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Vulnerability Scanner Icon
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Certified Ethical Hacker - CEH - icon set & web header banner
Vulnerability Management and analysis security hacker
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Internet Security Isometric Design Concept
Secure Online Payment Solution With Credit Card And Padlock Isometric Illustration
Data Leak icon vector image. Can be used for Compilance and Regulation.
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Infrastructure Security Solid Icon Vector Illustration
Database injection concept shows vulnerability in digital security
lock With Keyhole on digital data background
Flat illustration of woman managing IoT security internet of things protection
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
vulnerability cyber security system illustration lock symbol circuit broken
Vulnerability glyph color icon
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
patch update solid
A team of four people working together to protect data. One person holds a shield with a lock, representing security.
Security scan flat line icon set. Security scan Thin line illustration vector
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
A cracked shield symbolizes vulnerability and protection.
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Vector outline broken padlock icon representing security risks and vulnerabilities
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Infrastructure Security
Sign of Meltdown and spectre vulnerability on notebook monitor
System administrator online service or platform. Technical work with server
Security Holes Blue Icon
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Silhouette of a person standing with arms outstretched symbolizing vulnerability and openness
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
AI in Cybersecurity abstract concept vector illustrations.
Black line icon for Vulnerability
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Abstract technology security on global network background, vector illustration
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Next page
/ 10