Welcome to SebDB, the world’s most comprehensive cyber security behaviour database.
It’s co-designed and continually developed with the global security community. This version contains an extensive, dynamic collection of information relating to cyber security risks and how these link to security behaviours.
The database summarises and prioritises security behaviours by their importance and their impact on different security risks.Learn more
You can use SebDB to prioritise which behaviours to target in your awareness, behaviour and culture activities. And, by extension, target the reduction of specific human cyber risks.
Personal exposure is the extent to how much someones personal information is available online.
Account compromise happens when unauthorised people access them.
A data leak is when data is accidentally or intentionally disclosed to unauthorised people.
Physical damage is the damage, destruction or theft of devices and other hardware.
A privacy violation occurs when an unintended person learns about someone elses private information.
Identity theft and fraud can occur when criminals use personal information for their own gain, or when they cause ...
Malware infections occur when malicious software makes its way on to a device or network.
Data theft is the intentional stealing of data.