Methods of cyberattacks (share of successful methods used on Africa)
(Please use a modern browser to see the interactive version of this visualization)