Cyber Policy
•Create a histogram of distribution of ransom using plot.
•Add position ‘identity’ within geom histogram and alpha
•Recreate the plot, but make a separate histogram for each size of the company. All three histograms should be on the same plot.