---
> [!NOTE] 目次
```table-of-contents
title:
minLevel: 0
maxLevel: 0
includeLinks: true
```
---
> [!NOTE] リスト掲載用文字列
- [サイバー空間をめぐる脅威の情勢等|警察庁Webサイト](https://www.npa.go.jp/publications/statistics/cybersecurity/index.html)【警察庁】()
---
> [!NOTE] この記事の要約(箇条書き)
- このページは、警察庁によるサイバー空間をめぐる脅威の情勢に関する情報を提供しています。
- サイバー犯罪、サイバー攻撃等の事例や統計データが掲載されています。
- 令和7年(2025年)から平成26年(2014年)までの年間および上半期の報告書(PDF)と、関連する統計データ(Excel、CSV)が公開されています。
> [!NOTE] 要約おわり
---
## サイバー空間をめぐる脅威の情勢等
サイバー犯罪、サイバー攻撃等のサイバー空間の脅威について、事例や統計等データを掲載しています。
## 掲載資料
- [令和7年におけるサイバー空間をめぐる脅威の情勢等について(27.1MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R7/R07_cyber_jousei.pdf)
- [統計データ(156KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R7/R07_jousei_data.xlsx)
- [令和7年上半期におけるサイバー空間をめぐる脅威の情勢等について(15.2MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R7kami/R07_kami_cyber_jyosei.pdf)
- [統計データ(115KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R7kami/R07_jyousei_date.xlsx)
- [令和6年におけるサイバー空間をめぐる脅威の情勢等について(12.98MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_cyber_jousei.pdf)
- [統計データ(111KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data.xlsx)
- [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_1.csv) [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_3.csv) [図表4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_4.csv) [図表5(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_5.csv)
- [図表6(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_6.csv) [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_9.csv) [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_11.csv) [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_12.csv)
- [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_13.csv) [図表17(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_17.csv) [図表18(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_18.csv) [図表19(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_19.csv)
- [図表21(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_21.csv) [図表30(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_30.csv) [図表34(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_34.csv)
- [資料編P45-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P45_1.csv) [資料編P45-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P45_2.csv) [資料編P46-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P46_1.csv)
- [資料編P46-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P46_2.csv) [資料編P46-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P46_3.csv) [資料編P47-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P47_1.csv)
- [資料編P47-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P47_2.csv) [資料編P47-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P47_3.csv) [資料編P48-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P48_1.csv)
- [資料編P48-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P48_2.csv) [資料編P48-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P48_3.csv) [資料編P49-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P49_1.csv)
- [資料編P49-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P49_2.csv) [資料編P49-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P49_3.csv) [資料編P50-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P50_1.csv)
- [資料編P50-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P50_2.csv) [資料編P50-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P50_3.csv) [資料編P51-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P51_1.csv)
- [資料編P51-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P51_2.csv) [資料編P52-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P52_1.csv) [資料編P52-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P52_2.csv)
- [資料編P53-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P53_1.csv) [資料編P53-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P53_2.csv) [資料編P54-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P54_1.csv)
- [資料編P54-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P54_2.csv) [資料編P55-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P55_1.csv) [資料編P55-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P55_2.csv)
- [資料編P56-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P56_1.csv) [資料編P56-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P56_2.csv) [資料編P57-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P57_1.csv)
- [資料編P57-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P57_2.csv) [資料編P58(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P58.csv) [資料編P59-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P59_1.csv)
- [資料編P59-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P59_2.csv) [資料編P60-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P60_1.csv) [資料編P60-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P60_2.csv)
- [資料編P61-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P61_1.csv) [資料編P61-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P61_2.csv) [資料編P62-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P62_1.csv)
- [資料編P62-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P62_2.csv) [資料編P62-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P62_3.csv) [資料編P63(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P63.csv)
- [資料編P78-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P78_1.csv) [資料編P78-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P78_2.csv) [資料編P79(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P79.csv)
- [資料編P80-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P80_1.csv) [資料編P80-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6/R06_jousei_data_P80_2.csv)
- [令和6年上半期におけるサイバー空間をめぐる脅威の情勢等について(7.32MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_cyber_jousei.pdf)
- [統計データ(102KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data.xlsx)
- [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_1.csv) [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_3.csv) [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_7.csv) [図表8(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_8.csv)
- [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_9.csv) [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_11.csv) [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_12.csv) [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_13.csv)
- [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_14.csv) [図表15(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_15.csv) [資料編P34-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P34_1.csv) [資料編P34-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P34_2.csv)
- [資料編P35-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P35_1.csv) [資料編P35-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P35_2.csv) [資料編P35-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P35_3.csv)
- [資料編P36-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P36_1.csv) [資料編P36-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P36_2.csv) [資料編P36-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P36_3.csv)
- [資料編P37-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P37_1.csv) [資料編P37-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P37_2.csv) [資料編P37-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P37_3.csv)
- [資料編P37-4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P37_4.csv) [資料編P38-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P38_1.csv) [資料編P38-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P38_2.csv)
- [資料編P38-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P38_3.csv) [資料編P39-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P39_1.csv) [資料編P39-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P39_2.csv)
- [資料編P39-3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P39_3.csv) [資料編P39-4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P39_4.csv) [資料編P40(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P40.csv)
- [資料編P47-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P47_1.csv) [資料編P47-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P47_2.csv) [資料編P48-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P48_1.csv)
- [資料編P48-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P48_2.csv) [資料編P49-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P49_1.csv) [資料編P49-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P49_2.csv)
- [資料編P50-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P50_1.csv) [資料編P50-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P50_2.csv) [資料編P51-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P51_1.csv)
- [資料編P51-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P51_2.csv) [資料編P52-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P52_1.csv) [資料編P52-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P52_2.csv)
- [資料編P53-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P53_1.csv) [資料編P53-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P53_2.csv) [資料編P54-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P54_1.csv)
- [資料編P54-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P54_2.csv) [資料編P57-1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P57_1.csv) [資料編P57-2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P57_2.csv)
- [資料編P58(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R6kami/R06_kami_jousei_data_P58.csv)
- [令和5年におけるサイバー空間をめぐる脅威の情勢等について(4.12MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_cyber_jousei.pdf)
- [統計データ(67KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data.xlsx)
- [図表2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_2.csv) [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_7.csv) [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_9.csv) [図表10(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_10.csv)
- [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_11.csv) [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_12.csv) [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_13.csv) [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_14.csv)
- [図表16(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_16.csv) [図表19(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_19.csv) [図表21(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_21.csv) [図表22(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_22.csv)
- [図表23(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_23.csv) [図表24(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_24.csv) [図表25(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_25.csv) [図表26(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_26.csv)
- [図表27(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_27.csv) [図表28(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_28.csv) [図表29(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_29.csv) [図表33(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_33.csv)
- [図表34(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_34.csv) [図表35(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_35.csv) [図表36(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_36.csv) [図表37(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_37.csv)
- [図表38(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_38.csv) [図表41(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_41.csv) [図表47(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_47.csv) [図表48(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_48.csv)
- [図表49(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_49.csv) [図表50(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_50.csv) [図表51(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R5/R05_jousei_data_51.csv)
- [令和5年上半期におけるサイバー空間をめぐる脅威の情勢等について(4.84MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_cyber_jousei.pdf)
- [統計データ(71.6KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data.xlsx)
- [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_1.csv) [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_3.csv) [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_9.csv) [図表10(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_10.csv)
- [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_11.csv) [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_12.csv) [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_13.csv) [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_14.csv)
- [図表15(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_15.csv) [図表17(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_17.csv) [図表18(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_18.csv) [図表19(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_19.csv)
- [図表20(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_20.csv) [図表21(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_21.csv) [図表22(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_22.csv) [図表23(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_23.csv)
- [図表24(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_24.csv) [図表25(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_25.csv) [図表26(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_26.csv) [図表30(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_30.csv)
- [図表31(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_31.csv) [図表32(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_32.csv) [図表33(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_33.csv) [図表34(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_34.csv)
- [図表35(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_35.csv) [図表37(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_37.csv) [図表46(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_46.csv) [図表47(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_47.csv)
- [図表48(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_48.csv) [図表49(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_49.csv) [図表50(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R05_kami_jousei_data_50.csv)
- [令和4年におけるサイバー空間をめぐる脅威の情勢等について(4.91MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_cyber_jousei.pdf)
- [統計データ(46.6KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data.xlsx)
- [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data1.csv) [図表2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data2.csv) [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data3.csv) [図表4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data4.csv)
- [図表5(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data5.csv) [図表6(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data6.csv) [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data7.csv) [図表8(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data8.csv)
- [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data9.csv) [図表10(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data10.csv) [図表16(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data16.csv) [図表17(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data17.csv)
- [図表18(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data18.csv) [図表19(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data19.csv) [図表20(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data20.csv) [図表21(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data21.csv)
- [図表22(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data22.csv) [図表24(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data24.csv) [図表25(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data25.csv) [図表26(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data26.csv)
- [図表27(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_jousei_data27.csv)
- [令和4年上半期におけるサイバー空間をめぐる脅威の情勢等について(1.66MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_cyber_jousei.pdf)
- [統計データ(70KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data.xlsx)
- [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_1.csv) [図表2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_2.csv) [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_3.csv) [図表4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_4.csv)
- [図表5(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_5.csv) [図表6(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_6.csv) [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_7.csv) [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_12.csv)
- [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_13.csv) [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_14.csv) [図表16(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_16.csv) [図表17(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_17.csv)
- [図表18(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_18.csv) [図表19(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_19.csv) [図表24(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_24.csv) [図表25(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_25.csv)
- [図表26(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_26.csv) [図表27(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R04_kami_jousei_data_27.csv)
- [令和3年におけるサイバー空間をめぐる脅威の情勢等について(1.95MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_cyber_jousei.pdf)
- [統計データ(61KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data.xlsx)
- [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_1.csv) [図表2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_2.csv) [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_3.csv) [図表4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_4.csv)
- [図表5(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_5.csv) [図表6(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_6.csv) [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_7.csv) [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_9.csv)
- [図表10(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_10.csv) [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_11.csv) [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_12.csv) [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_13.csv)
- [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_14.csv) [図表16(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_16.csv) [図表17(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_17.csv) [図表18(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_18.csv)
- [図表19(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_19.csv) [図表24(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_data_24.csv)
- [令和3年におけるサイバー空間をめぐる脅威の情勢等について(速報版)(1.13MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_cyber_jousei_sokuhou.pdf)
- [統計データ(56KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou.xlsx)
- [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_01.csv) [図表2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_02.csv) [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_03.csv) [図表4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_04.csv)
- [図表5(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_05.csv) [図表6(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_06.csv) [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_07.csv) [図表8(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_08.csv)
- [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_09.csv) [図表10(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_10.csv) [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_11.csv) [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_12.csv)
- [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_13.csv) [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_14.csv) [図表15(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_jousei_sokuhou_15.csv)
- [令和3年上半期におけるサイバー空間をめぐる脅威の情勢等について(4.58MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_cyber_jousei.pdf)
- [統計データ(88KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_data.xlsx)
- [図表1(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_01.csv) [図表2(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_02.csv) [図表3(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_03.csv) [図表4(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_04.csv)
- [図表5(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_05.csv) [図表6(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_06.csv) [図表7(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_07.csv) [図表9(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_09.csv)
- [図表10(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_10.csv) [図表11(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_11.csv) [図表12(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_12.csv) [図表13(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_13.csv)
- [図表14(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_14.csv) [図表16(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_16.csv) [図表17(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_17.csv) [図表18(CSV)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R03_kami_jousei_18.csv)
- [令和2年におけるサイバー空間をめぐる脅威の情勢等について(1.63MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R02_cyber_jousei.pdf)
- [統計データ(80KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R02_jousei_data.xlsx)
- [英語版(2.05MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R02_cyber_jousei_eng.pdf)
- [令和2年上半期におけるサイバー空間をめぐる脅威の情勢等について(728KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R02_kami_cyber_jousei.pdf)
- [統計データ(76KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R02_kami_jousei_data.xlsx)
- [令和元年におけるサイバー空間をめぐる脅威の情勢等について(1.07MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R01_cyber_jousei.pdf)
- [統計データ(92KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R01_jousei_data.xlsx)
- [英語版(1.15MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R01_cyber_jousei_eng.pdf)
- [令和元年上半期におけるサイバー空間をめぐる脅威の情勢等について(980KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R01_kami_cyber_jousei.pdf)
- [統計データ(43KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R01_kami_jousei_data.xlsx)
- [英語版(383KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/R01_kami_cyber_jousei_eng.pdf)
- [平成30年におけるサイバー空間をめぐる脅威の情勢等について(980KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H30_cyber_jousei.pdf)
- [統計データ(44KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H30_jousei_data.xlsx)
- [英語版(655KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H30_cyber_jousei_eng.pdf)
- [平成30年上半期におけるサイバー空間をめぐる脅威の情勢等について(995KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H30_kami_cyber_jousei.pdf)
- [統計データ(44KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H30_kami_jousei_data.xlsx)
- [英語版(840KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H30_kami_cyber_jousei_eng.pdf)
- [平成29年中におけるサイバー空間をめぐる脅威の情勢等について(1.56MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H29_cyber_jousei.pdf)
- [平成29年上半期におけるサイバー空間をめぐる脅威の情勢等について(1.20MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H29_kami_cyber_jousei.pdf)
- [平成28年中におけるサイバー空間をめぐる脅威の情勢等について(1.30MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H28cyber_jousei.pdf)
- [統計データ(30KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H28_jousei_data.xlsx)
- [平成28年上半期におけるサイバー空間をめぐる脅威の情勢について(547KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H28_kami_jousei.pdf)
- [統計データ(23KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H28_kami_jousei_data.xlsx)
- [平成27年におけるサイバー空間をめぐる脅威の情勢について(818KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H27_jousei.pdf)
- [統計データ(20KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H27_jousei_data.xlsx)
- [平成27年上半期のサイバー空間をめぐる脅威の情勢について(1.45MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H27_kami_jousei.pdf)
- [統計データ(21KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H27_kami_jousei_data.xlsx)
- [平成26年中のサイバー空間をめぐる脅威の情勢について(1.65KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H26_jousei.pdf)
- [統計データ(21KB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H26_jousei_data.xlsx)
- [平成26年上半期のサイバー空間をめぐる脅威の情勢について(2MB)](https://www.npa.go.jp/publications/statistics/cybersecurity/data/H26_kami_jousei.pdf)