Elza Ahmad, M. F. Fahroza, Fanny Ramadhani, Ayu Syahfitri, Dimas Fadhlurohhman
{"title":"Implementation Of Combinatorial in Determining Password Technology","authors":"Elza Ahmad, M. F. Fahroza, Fanny Ramadhani, Ayu Syahfitri, Dimas Fadhlurohhman","doi":"10.30596/JCOSITTE.V2I1.6526","DOIUrl":null,"url":null,"abstract":"In the era of the Industrial Revolution 4.0, the use of technology has increased rapidly in less than 1 century, so that the use of technology has become a common need of society today. At this time, Users who use this technology even store personal or digitally important things such as storing important documents, personal information, even storing digital wallets or other things that are related to the user's confidentiality. so that to maintain the confidentiality of these things from other users, security is needed that can protect all the contents of the data that we have in this technology so that not just anyone can access things that are important in using this technology.","PeriodicalId":202535,"journal":{"name":"Journal of Computer Science, Information Technologi and Telecommunication Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Science, Information Technologi and Telecommunication Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30596/JCOSITTE.V2I1.6526","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In the era of the Industrial Revolution 4.0, the use of technology has increased rapidly in less than 1 century, so that the use of technology has become a common need of society today. At this time, Users who use this technology even store personal or digitally important things such as storing important documents, personal information, even storing digital wallets or other things that are related to the user's confidentiality. so that to maintain the confidentiality of these things from other users, security is needed that can protect all the contents of the data that we have in this technology so that not just anyone can access things that are important in using this technology.