scholarly journals Information security breaches due to ransomware attacks - a systematic literature review

Author(s):  
T.R. Reshmi
Author(s):  
Hari Murti ◽  
Endang Lestariningsih ◽  
Rara Sriartati Redjeki ◽  
Eka Ardhianto

The rapid technological revolution had an impact on a variety of information security techniques. This will be important because information can be confidential to some entities that communicate with each other. Internet in intelligent technology will be a loophole for cryptanalysts to look for information vulnerabilities. Cryptography is a method of securing data and information which is currently still supported by the development of the method. However, the data and information that are secured will still have vulnerabilities in their delivery. The combination of fuzzy logic techniques with cryptographic techniques has been applied to support the improvement of information security. This study applies a systematic literature review method, to find articles that combine the two fields. The purpose of this study is to see the development of information security techniques with a fuzzy logic approach. As a result, it is found that the development of cryptographic and steganographic techniques that utilize fuzzy logic to help improve information security. In addition, the use of fuzzy logic is also not limited to increasing security. Fuzzy logic also plays a role in selecting the best key and password and issuing random numbers from a Pseudo-Random Number Generator (PRNG).


2020 ◽  
Vol 1551 ◽  
pp. 012005
Author(s):  
Puspadevi Kuppusamy ◽  
Ganthan Narayana Samy ◽  
Nurazean Maarop ◽  
Pritheega Magalingam ◽  
Norshaliza Kamaruddin ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document