--- > [!NOTE] 目次 ```table-of-contents title: minLevel: 0 maxLevel: 0 includeLinks: true ``` --- > [!NOTE] リスト掲載用文字列 - [サイバー空間をめぐる脅威の情勢等|警察庁Webサイト](https://www.npa.go.jp/publications/statistics/cybersecurity/index.html)【警察庁】() --- > [!NOTE] この記事の要約(箇条書き) - このページは、警察庁によるサイバー空間をめぐる脅威の情勢に関する情報を提供しています。 - サイバー犯罪、サイバー攻撃等の事例や統計データが掲載されています。 - 令和7年(2025年)から平成26年(2014年)までの年間および上半期の報告書(PDF)と、関連する統計データ(Excel、CSV)が公開されています。 > [!NOTE] 要約おわり --- ## サイバー空間をめぐる脅威の情勢等 サイバー犯罪、サイバー攻撃等のサイバー空間の脅威について、事例や統計等データを掲載しています。 ## 掲載資料 - [令和7年におけるサイバー空間をめぐる脅威の情勢等について(27.1MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R7/R07_cyber_jousei.pdf) - [統計データ(156KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R7/R07_jousei_data.xlsx) - [令和7年上半期におけるサイバー空間をめぐる脅威の情勢等について(15.2MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R7kami/R07_kami_cyber_jyosei.pdf) - [統計データ(115KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R7kami/R07_jyousei_date.xlsx) - [令和6年におけるサイバー空間をめぐる脅威の情勢等について(12.98MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_cyber_jousei.pdf) - [統計データ(111KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data.xlsx) - [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_1.csv)    [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_3.csv) [図表4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_4.csv)    [図表5(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_5.csv) - [図表6(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_6.csv)   [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_9.csv)    [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_11.csv)   [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_12.csv) - [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_13.csv)   [図表17(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_17.csv)    [図表18(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_18.csv)    [図表19(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_19.csv) - [図表21(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_21.csv)    [図表30(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_30.csv)    [図表34(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_34.csv) - [資料編P45-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P45_1.csv)    [資料編P45-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P45_2.csv)    [資料編P46-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P46_1.csv) - [資料編P46-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P46_2.csv)    [資料編P46-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P46_3.csv)    [資料編P47-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P47_1.csv) - [資料編P47-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P47_2.csv)    [資料編P47-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P47_3.csv)    [資料編P48-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P48_1.csv) - [資料編P48-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P48_2.csv)    [資料編P48-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P48_3.csv)    [資料編P49-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P49_1.csv) - [資料編P49-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P49_2.csv)    [資料編P49-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P49_3.csv)    [資料編P50-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P50_1.csv) - [資料編P50-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P50_2.csv)    [資料編P50-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P50_3.csv)    [資料編P51-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P51_1.csv) - [資料編P51-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P51_2.csv)    [資料編P52-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P52_1.csv)    [資料編P52-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P52_2.csv) - [資料編P53-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P53_1.csv)    [資料編P53-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P53_2.csv)    [資料編P54-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P54_1.csv) - [資料編P54-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P54_2.csv)    [資料編P55-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P55_1.csv)    [資料編P55-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P55_2.csv) - [資料編P56-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P56_1.csv)    [資料編P56-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P56_2.csv)    [資料編P57-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P57_1.csv) - [資料編P57-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P57_2.csv)    [資料編P58(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P58.csv)     [資料編P59-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P59_1.csv) - [資料編P59-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P59_2.csv)    [資料編P60-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P60_1.csv)    [資料編P60-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P60_2.csv) - [資料編P61-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P61_1.csv)    [資料編P61-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P61_2.csv)    [資料編P62-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P62_1.csv) - [資料編P62-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P62_2.csv)   [資料編P62-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P62_3.csv)    [資料編P63(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P63.csv) - [資料編P78-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P78_1.csv)    [資料編P78-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P78_2.csv)    [資料編P79(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P79.csv) - [資料編P80-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P80_1.csv)    [資料編P80-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P80_2.csv) - [令和6年上半期におけるサイバー空間をめぐる脅威の情勢等について(7.32MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_cyber_jousei.pdf) - [統計データ(102KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data.xlsx) - [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_1.csv)    [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_3.csv) [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_7.csv)    [図表8(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_8.csv) - [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_9.csv)   [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_11.csv)    [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_12.csv)   [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_13.csv) - [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_14.csv)   [図表15(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_15.csv)    [資料編P34-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P34_1.csv)    [資料編P34-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P34_2.csv) - [資料編P35-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P35_1.csv)    [資料編P35-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P35_2.csv)    [資料編P35-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P35_3.csv) - [資料編P36-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P36_1.csv)    [資料編P36-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P36_2.csv)    [資料編P36-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P36_3.csv) - [資料編P37-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P37_1.csv)    [資料編P37-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P37_2.csv)    [資料編P37-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P37_3.csv) - [資料編P37-4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P37_4.csv)    [資料編P38-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P38_1.csv)    [資料編P38-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P38_2.csv) - [資料編P38-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P38_3.csv)    [資料編P39-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P39_1.csv)    [資料編P39-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P39_2.csv) - [資料編P39-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P39_3.csv)    [資料編P39-4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P39_4.csv)    [資料編P40(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P40.csv) - [資料編P47-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P47_1.csv)    [資料編P47-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P47_2.csv)    [資料編P48-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P48_1.csv) - [資料編P48-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P48_2.csv)    [資料編P49-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P49_1.csv)    [資料編P49-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P49_2.csv) - [資料編P50-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P50_1.csv)    [資料編P50-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P50_2.csv)    [資料編P51-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P51_1.csv) - [資料編P51-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P51_2.csv)    [資料編P52-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P52_1.csv)    [資料編P52-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P52_2.csv) - [資料編P53-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P53_1.csv)    [資料編P53-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P53_2.csv)    [資料編P54-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P54_1.csv) - [資料編P54-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P54_2.csv)    [資料編P57-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P57_1.csv)    [資料編P57-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P57_2.csv) - [資料編P58(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P58.csv) - [令和5年におけるサイバー空間をめぐる脅威の情勢等について(4.12MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_cyber_jousei.pdf) - [統計データ(67KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data.xlsx) - [図表2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_2.csv)    [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_7.csv) [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_9.csv)    [図表10(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_10.csv) - [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_11.csv)   [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_12.csv)    [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_13.csv)   [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_14.csv) - [図表16(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_16.csv)   [図表19(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_19.csv)    [図表21(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_21.csv)    [図表22(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_22.csv) - [図表23(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_23.csv)   [図表24(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_24.csv)    [図表25(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_25.csv)    [図表26(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_26.csv) - [図表27(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_27.csv)   [図表28(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_28.csv)   [図表29(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_29.csv) [図表33(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_33.csv) - [図表34(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_34.csv)   [図表35(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_35.csv)   [図表36(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_36.csv) [図表37(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_37.csv) - [図表38(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_38.csv)   [図表41(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_41.csv)   [図表47(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_47.csv) [図表48(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_48.csv) - [図表49(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_49.csv)   [図表50(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_50.csv)   [図表51(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_51.csv) - [令和5年上半期におけるサイバー空間をめぐる脅威の情勢等について(4.84MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_cyber_jousei.pdf) - [統計データ(71.6KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data.xlsx) - [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_1.csv)    [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_3.csv) [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_9.csv)    [図表10(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_10.csv) - [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_11.csv)   [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_12.csv)    [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_13.csv)   [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_14.csv) - [図表15(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_15.csv)   [図表17(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_17.csv)    [図表18(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_18.csv)    [図表19(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_19.csv) - [図表20(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_20.csv)   [図表21(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_21.csv)    [図表22(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_22.csv)    [図表23(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_23.csv) - [図表24(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_24.csv)   [図表25(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_25.csv)   [図表26(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_26.csv) [図表30(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_30.csv) - [図表31(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_31.csv)   [図表32(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_32.csv)   [図表33(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_33.csv) [図表34(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_34.csv) - [図表35(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_35.csv)   [図表37(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_37.csv)   [図表46(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_46.csv) [図表47(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_47.csv) - [図表48(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_48.csv)   [図表49(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_49.csv)   [図表50(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_50.csv) - [令和4年におけるサイバー空間をめぐる脅威の情勢等について(4.91MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_cyber_jousei.pdf) - [統計データ(46.6KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data.xlsx) - [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data1.csv)    [図表2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data2.csv)    [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data3.csv)    [図表4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data4.csv) - [図表5(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data5.csv)    [図表6(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data6.csv)    [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data7.csv)    [図表8(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data8.csv) - [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data9.csv)    [図表10(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data10.csv)    [図表16(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data16.csv)    [図表17(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data17.csv) - [図表18(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data18.csv)    [図表19(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data19.csv)    [図表20(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data20.csv)    [図表21(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data21.csv) - [図表22(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data22.csv)    [図表24(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data24.csv)   [図表25(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data25.csv) [図表26(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data26.csv) - [図表27(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data27.csv) - [令和4年上半期におけるサイバー空間をめぐる脅威の情勢等について(1.66MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_cyber_jousei.pdf) - [統計データ(70KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data.xlsx) - [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_1.csv)    [図表2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_2.csv)    [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_3.csv)    [図表4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_4.csv) - [図表5(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_5.csv)    [図表6(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_6.csv)    [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_7.csv)    [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_12.csv) - [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_13.csv)    [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_14.csv)    [図表16(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_16.csv)    [図表17(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_17.csv) - [図表18(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_18.csv)    [図表19(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_19.csv)    [図表24(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_24.csv)    [図表25(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_25.csv) - [図表26(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_26.csv)    [図表27(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_27.csv) - [令和3年におけるサイバー空間をめぐる脅威の情勢等について(1.95MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_cyber_jousei.pdf) - [統計データ(61KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data.xlsx) - [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_1.csv)    [図表2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_2.csv)    [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_3.csv)    [図表4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_4.csv) - [図表5(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_5.csv)    [図表6(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_6.csv)    [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_7.csv)    [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_9.csv) - [図表10(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_10.csv)    [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_11.csv)    [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_12.csv)    [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_13.csv) - [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_14.csv)    [図表16(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_16.csv)    [図表17(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_17.csv)    [図表18(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_18.csv) - [図表19(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_19.csv)    [図表24(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_24.csv) - [令和3年におけるサイバー空間をめぐる脅威の情勢等について(速報版)(1.13MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_cyber_jousei_sokuhou.pdf) - [統計データ(56KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou.xlsx) - [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_01.csv)    [図表2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_02.csv)    [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_03.csv)    [図表4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_04.csv) - [図表5(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_05.csv)    [図表6(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_06.csv)    [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_07.csv)    [図表8(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_08.csv) - [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_09.csv)    [図表10(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_10.csv)    [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_11.csv)    [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_12.csv) - [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_13.csv)    [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_14.csv)    [図表15(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_15.csv) - [令和3年上半期におけるサイバー空間をめぐる脅威の情勢等について(4.58MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_cyber_jousei.pdf) - [統計データ(88KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_data.xlsx) - [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_01.csv)    [図表2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_02.csv)    [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_03.csv)    [図表4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_04.csv) - [図表5(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_05.csv)    [図表6(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_06.csv)    [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_07.csv)    [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_09.csv) - [図表10(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_10.csv)    [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_11.csv)    [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_12.csv)    [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_13.csv) - [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_14.csv)    [図表16(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_16.csv)    [図表17(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_17.csv)    [図表18(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_18.csv) - [令和2年におけるサイバー空間をめぐる脅威の情勢等について(1.63MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R02_cyber_jousei.pdf) - [統計データ(80KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R02_jousei_data.xlsx) - [英語版(2.05MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R02_cyber_jousei_eng.pdf) - [令和2年上半期におけるサイバー空間をめぐる脅威の情勢等について(728KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R02_kami_cyber_jousei.pdf) - [統計データ(76KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R02_kami_jousei_data.xlsx) - [令和元年におけるサイバー空間をめぐる脅威の情勢等について(1.07MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R01_cyber_jousei.pdf) - [統計データ(92KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R01_jousei_data.xlsx) - [英語版(1.15MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R01_cyber_jousei_eng.pdf) - [令和元年上半期におけるサイバー空間をめぐる脅威の情勢等について(980KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R01_kami_cyber_jousei.pdf) - [統計データ(43KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R01_kami_jousei_data.xlsx) - [英語版(383KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R01_kami_cyber_jousei_eng.pdf) - [平成30年におけるサイバー空間をめぐる脅威の情勢等について(980KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H30_cyber_jousei.pdf) - [統計データ(44KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H30_jousei_data.xlsx) - [英語版(655KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H30_cyber_jousei_eng.pdf) - [平成30年上半期におけるサイバー空間をめぐる脅威の情勢等について(995KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H30_kami_cyber_jousei.pdf) - [統計データ(44KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H30_kami_jousei_data.xlsx) - [英語版(840KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H30_kami_cyber_jousei_eng.pdf) - [平成29年中におけるサイバー空間をめぐる脅威の情勢等について(1.56MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H29_cyber_jousei.pdf) - [平成29年上半期におけるサイバー空間をめぐる脅威の情勢等について(1.20MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H29_kami_cyber_jousei.pdf) - [平成28年中におけるサイバー空間をめぐる脅威の情勢等について(1.30MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H28cyber_jousei.pdf) - [統計データ(30KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H28_jousei_data.xlsx) - [平成28年上半期におけるサイバー空間をめぐる脅威の情勢について(547KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H28_kami_jousei.pdf) - [統計データ(23KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H28_kami_jousei_data.xlsx) - [平成27年におけるサイバー空間をめぐる脅威の情勢について(818KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H27_jousei.pdf) - [統計データ(20KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H27_jousei_data.xlsx) - [平成27年上半期のサイバー空間をめぐる脅威の情勢について(1.45MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H27_kami_jousei.pdf) - [統計データ(21KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H27_kami_jousei_data.xlsx) - [平成26年中のサイバー空間をめぐる脅威の情勢について(1.65KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H26_jousei.pdf) - [統計データ(21KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H26_jousei_data.xlsx) - [平成26年上半期のサイバー空間をめぐる脅威の情勢について(2MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H26_kami_jousei.pdf)