Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
vulnerability cyber security system illustration lock symbol circuit broken
risk management asset vulnerability assessment concept
Abstract technology security  global network background, vector
Print
Security Testing Icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Cybersecurity Line Icons Editable Stroke: Protection, Security, and Data Safety
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Vulnerability Icon
Ethical hacker. Character conducting a security penetration test. White
Hacker activity icon set collection. Simple line vector.
Risk Management Risk Management Bundle H50
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Virus on laptop, malware or network vulnerability vector
Exploit Icon
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Cyber Threat Icon
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple line vector
Risk management mind map flowchart business concept for presentations and reports
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Debug icon symbol collection on white background.
Cyber scanner Icon
Risk Icon
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Bug Icon
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
malware, cyber attack line vector icon
Penetration Testing Icon
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Security Scan Icon
Risk Assessment Icon
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Threat Detection Glyph Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Protection background. Technology security, encode and decrypt, techno scheme
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
vector icon of a document with a shield with a blue background in the shape of a shield
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Programmer at work. Computer assisted design, developer testing program.
malware, cyber attack or virus line icon
Risk Icon
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
Laptop icon infected by malware with long shadow on white backgr
Penetration Testing Icon
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Open backdoor in a black wall cybersecurity concept illustration
Hearing loss concept. Human ear disease or disability. Deaf person
Isometric cybersecurity icons with warning symbols in vector art
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Security Testing Icon
Vulnerability text with decimal number background
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Mitigation Plan Icon Collection and Simple Concept Outline Color, Containing: Climate Change,Green Environment,Evacuation Plan,Ecology,Reduction,Notification,Community,Task List,Disaster Recovery
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Bug fixing doodle for improve website performance
Security warning shield indicating a potential threat or vulnerability
Ethical Hacking Icon
Vulnerability Icons
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Market Data Icon  in black line style icon, style isolated on white background
Information Technologies Horizontal Banners
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Ethical hacker set. Character conducting a security penetration test. White
hacker logo. vector. editable.
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple line vector.
Vulnerability Line Two Color Icon
Abstract technology security on global network background, vector illustration
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Certified Ethical Hacker - CEH - icon set & web header banner
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Simple set of vulnerability related filled icons.
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Cybersecurity threat concept with syringe injecting malware into computer chip, data breach risk, digital attack, virus protection, vector design element
Next page
/ 10