The approach is not attributed to a single individual or organization, but rather is a collective concept that has been shaped and refined through the ongoing efforts of the information security co…