Methods of cyberattacks (share of successful methods used on Africa)