/
Welcome 👋
Welcome to SebDB, the world’s most comprehensive cyber security behaviour database.
SebDB maps security behaviours to risk-related outcomes.
SebDB is maintained by a global community of security professionals and academics.
Getting started







Risk Mapping

Account Compromise
Account compromise happens when unauthorised people access them.

Malware Infection
Malware infections occur when malicious software makes its way on to a device or network.

Data Theft
Data theft is the intentional stealing of data.

Data Leak
A data leak is when data is accidentally or intentionally disclosed to unauthorised people.

Physical Damage
Physical damage is the damage, destruction or theft of devices and other hardware.

Personal Exposure
Personal exposure is the extent to how much someones personal information is available online.

Privacy Violation
A privacy violation occurs when an unintended person learns about someone elses private information.

Fraud & Identity Theft
Identity theft and fraud can occur when criminals use personal information for their own gain, or when they cause ...