An IT-based society inevitably has IT “enemies” such as computer viruses which threaten security. IPA responds to such threats to help make IT-based society safer.
Security vulnerabilities in IT systems ordinarily go undetected, but problems occur when third parties exploit these vulnerabilities. Therefore, eliminating vulnerabilities is important to ensuring system security. IPA has a formidable capacity to collect information on vulnerabilities; we operate a website in cooperation with developers and other engineers to make information on vulnerability countermeasures freely available.
Computer viruses are malicious programs working without authorization inside IT systems; they leak important data and destroy systems. Unauthorized access refers to the external infiltration of IT systems without permission, and may involve overwriting websites (tampering) and stealing data.
These malicious acts not only cause serious damage to IT systems, but also cause major social and fi nancial damage to system users. To protect users from these threats, IPA collects, studies and analyzes information on information security issues, and disseminates the latest alerts and information. IPA strives, through these activities, to realize a society where everyone can use IT systems, worry-free and in comfort.
http://www.ipa.go.jp/security/anshin/
IPA established the Security Help Desk to field general enquiries regarding malware - including computer viruses - and unauthorized access, and give technical advice, so all citizens can use IT, worry-free. IPA’s help desks provide information through the website FAQ page to alleviate user concerns and offers further assistance to telephone, e-mail, fax, or postal enquiries.
| Telephone | +81-3-5978-7509 |
|---|---|
| FAX | +81-3-5978-7518 |
| Post | Security Help Desk, IPA Security Center Bunkyo Green Court Center Offi ce, 16th Floor, 2-28-8 Hon-Komagome, Bunkyo-ku, Tokyo, Japan 113-6591 |

The government pursues an ongoing e-Government policy through the computerization of administrative work, which was until now paper-based, and is using IT for various procedures and information dissemination. Given the nature of the data handled, e-Government requires the strictest security and reliability to protect valuable information on citizens.
As such, IPA jointly operates a project with the Ministry of Internal Affairs and Communications, the Ministry of Economy, Trade and Industry and other institutions to examine and evaluate encryption technology, and has published the e-Government Recommended Ciphers List, a list of usable encryption technology for e-Government.
The encryption technology on this list-the security of which is constantly monitored by the project-can also be used by corporate and other users as information security measures for their IT systems.
IPA publishes reports on the development and research results into security technology and releases them on its website. These reports are aimed at disseminating accurate information to general users for them to use IT systems with an appropriate knowledge of security issues.
This annual white paper analyzes information security trends and future prospects in Japan and the world. The paper has various uses as reference material for IT system users and administrators to learn about information security and as a text on future countermeasures for people working with information security.
The second part of the white paper identifies the 10 Major Security Threats, based on vulnerability reports received by IPA and general news reports. This list compiled by the 10 Major Security Threats Authors' Committee, which comprises researchers and practitioners in the information security field, is a good resource on what risks threaten the IT world, today, and the latest trends.
![]() |
![]() |
| No.1 | Targeted Attack (APT) |
| No.2 | Stopping business from natural disaster |
| No.3 | Attacks conducted by Hactivist |
| No.4 | Attacks to aim Client software's vulnerabilities |
| No.5 | Attacks to aim Web Site |
| No.6 | Attacks to aim Smart device |
| No.7 | Certifi cate Authority (CA) was hacked |
| No.8 | Inside threats |
| No.9 | Account and Password were theft |
| No.10 | Privacy problems |
Advances in IT bring an increased risk of new, hitherto unimaginable dangers, so IPA established the Threat and Countermeasure Committee for experts across disciplines to gather and share their knowledge and expertise. The committee will investigate and analyze the new types of dangers threatening IT systems, consider countermeasures, and publish the results for users.
The aim of the committee is to protect the security of our IT-based society long into the future.