From 303feec9e9809974c95668822fb5b22437c956e1 Mon Sep 17 00:00:00 2001 From: KubloPL Date: Sun, 7 Jan 2024 21:19:42 +0100 Subject: [PATCH] final update --- index.html | 16 +++++----------- script/fetchv6.js => script.js | 6 ++++-- 2 files changed, 9 insertions(+), 13 deletions(-) rename script/fetchv6.js => script.js (98%) diff --git a/index.html b/index.html index 9f188d3..96f7e02 100644 --- a/index.html +++ b/index.html @@ -1,16 +1,16 @@ + Cybersecurity Breach Incidents Database - Document - + @@ -96,7 +96,6 @@

Table

Employee Count Affected Customers Data Type - Data Stolen Attack Type Attack Vector Response Time @@ -125,7 +124,7 @@

Table

Graphs

- +
@@ -133,7 +132,6 @@

Graphs

Breach types

This pie chart represents the distribution or proportion of different breach types (e.g., phishing, ransomware).

-
@@ -149,7 +147,7 @@

Breaches across indust

- +
@@ -157,12 +155,9 @@

Breaches across indust

Map

This map-based visualization shows the geographical locations where breaches occurred. It uses markers to indicate breach locations across different countries or regions, providing a spatial understanding of breach occurrences.

-

- - @@ -172,7 +167,7 @@

Map

About us

Our team

-
+
@@ -229,7 +224,6 @@

Our University

- uek

Uniwersytet Ekonomiczny w Krakowie

diff --git a/script/fetchv6.js b/script.js similarity index 98% rename from script/fetchv6.js rename to script.js index bf28eb0..47ee4d7 100644 --- a/script/fetchv6.js +++ b/script.js @@ -34,7 +34,6 @@ document.addEventListener('DOMContentLoaded', async () => { ${entry.employee_count} ${entry.affected_customers} ${entry.data_type} - ${entry.data_stolen} ${entry.attack_type} ${entry.attack_vector} ${entry.response_time} @@ -92,7 +91,10 @@ document.addEventListener('DOMContentLoaded', async () => { }, options: { scales: { - x: { stacked: true }, + x: { + display: false, + stacked: true, + }, y: { stacked: true }, }, },