Figure 11: Targeted code type by attacker type

Get the data