Security Behaviour Database

Welcome 👋

Welcome to SebDB, the world’s most comprehensive cyber security behaviour database.


It’s co-designed and continually developed with the global security community. This version contains an extensive, dynamic collection of information relating to cyber security risks and how these link to security behaviours.

New to SebDB?

The database summarises and prioritises security behaviours by their importance and their impact on different security risks.

Learn more

Risk Mapping

You can use SebDB to prioritise which behaviours to target in your awareness, behaviour and culture activities. And, by extension, target the reduction of specific human cyber risks.

Personal Exposure

Personal Exposure

Personal exposure is the extent to how much someones personal information is available online.

Account Compromise

Account Compromise

Account compromise happens when unauthorised people access them.

Data Leak

Data Leak

A data leak is when data is accidentally or intentionally disclosed to unauthorised people.

Physical Damage

Physical Damage

Physical damage is the damage, destruction or theft of devices and other hardware.

Privacy Violation

Privacy Violation

A privacy violation occurs when an unintended person learns about someone elses private information.

Fraud & Identity Theft

Fraud & Identity Theft

Identity theft and fraud can occur when criminals use personal information for their own gain, or when they cause ...

Malware Infection

Malware Infection

Malware infections occur when malicious software makes its way on to a device or network.

Data Theft

Data Theft

Data theft is the intentional stealing of data.