Security Behaviour Database
/

Welcome 👋

Welcome to SebDB, the world’s most comprehensive cyber security behaviour database.

SebDB maps security behaviours to risk-related outcomes.

SebDB is maintained by a global community of security professionals and academics.

Getting started

Risk Mapping

Account Compromise

Account Compromise

Account compromise happens when unauthorised people access them.

Malware Infection

Malware Infection

Malware infections occur when malicious software makes its way on to a device or network.

Data Theft

Data Theft

Data theft is the intentional stealing of data.

Data Leak

Data Leak

A data leak is when data is accidentally or intentionally disclosed to unauthorised people.

Physical Damage

Physical Damage

Physical damage is the damage, destruction or theft of devices and other hardware.

Personal Exposure

Personal Exposure

Personal exposure is the extent to how much someones personal information is available online.

Privacy Violation

Privacy Violation

A privacy violation occurs when an unintended person learns about someone elses private information.

Fraud & Identity Theft

Fraud & Identity Theft

Identity theft and fraud can occur when criminals use personal information for their own gain, or when they cause ...

SebDB is brought to you byCybSafe| © 2022 CybSafe Ltd