Information Security Based on LLM Approaches: A Review