Strategi Keamanan Data dalam Database Relasional : Tinjauan Literatur
DOI:
https://doi.org/10.61132/jumabedi.v2i2.518Keywords:
Data Encryption, IDS, RBAC, Relational Database Security, SQL InjectionAbstract
Relational databases, an essential component in modern information systems, are vulnerable to various security threats, both internal such as abuse of access rights, and external such as SQL injection, malware, and hacking. Given these conditions, how can relevant mitigation strategies be implemented to protect data security in relational databases? This article aims to identify the main threats to relational database security and map out relevant mitigation strategies. The method used is a literature review of various recent scientific journals that discuss aspects of data security in the context of relational databases. The results of the review indicate that threats such as SQL injection can be overcome by strict input validation, abuse of access rights can be prevented through role-based access control (RBAC), malware attacks can be detected using an intrusion detection system (IDS), and hacking actions can be minimized through the implementation of data encryption. This study is expected to be a reference in designing effective security strategies to protect data in relational databases.
Downloads
References
Aditya, A. R. M., Putri, A. W. O. K., Musthofa, D. L., & Widodo, P. (2022). Serangan hacking tools sebagai ancaman siber dalam sistem pertahanan negara (studi kasus: Predator). Global Political Studies Journal, 6(1), 35–46. https://doi.org/10.34010/gpsjournal.v6i1
Agustin, R., Fitri, I., & Nathasia, N. D. (2018). Implementasi metode Intrusion Detection Systems (IDS) dan Intrusion Prevention System (IPS) berbasis Snort server untuk keamanan jaringan LAN. Jurnal Informatika, 18(1), 71–82.
Aljanabi, M., Ismail, M. A., & Ali, A. H. (2021). Intrusion detection systems, issues, challenges, and needs. International Journal of Computational Intelligence Systems. https://doi.org/10.2991/ijcis.d.210105.001
Asriyanik. (2017). Studi terhadap Advanced Encryption Standard (AES) dan algoritma Knapsack dalam pengamanan data. Jurnal SANTIKA: Jurnal Ilmiah Sains dan Teknologi, 7(1), 553–560.
Fitria, K. M. (2023). Analisis serangan malware dalam perbankan dan perencanaan solusi keamanan. Jurnal Informatika dan Teknik Elektro Terapan, 11(3), 721–731. https://doi.org/10.23960/jitet.v11i3.3312
Gemawaty, C. A., & Yuliani, Y. (2024). Manajemen Identitas dan Akses dalam Keamanan Sistem Informasi (Pendekatan literature review). Jurnal Manajemen Informatika Jayakarta, 4(4), 396–403. https://doi.org/10.52362/jmijayakarta.v4i4.1527
Hasibuan, S. H., & Nasution, M. I. P. (2023). A comparative study of relational and NoSQL database for big data analytics. Jurnal Pendidikan, Sains dan Teknologi (JPST), 2(3), 513–516. http://jurnal.minarits.com/index.php/jpst/
Hermawan, A., & Ujianto, E. I. H. (2021). Implementasi enkripsi data menggunakan kombinasi AES dan RSA. InfoTekJar: Jurnal Nasional Informatika dan Teknologi Jaringan, 5(2), 326–330. https://doi.org/10.30743/infotekjar.v5i2.3585
Jemal, I., Cheikhrouhou, O., Hamam, H., & Mahfoudhi, A. (2020). SQL injection attack detection and prevention techniques using machine learning. International Journal of Applied Engineering Research.
Manoppo, V. A., Lumenta, A. S. M., & Karouw, S. D. S. (2020). Analisa malware menggunakan metode dynamic analysis pada jaringan Universitas Sam Ratulangi. Jurnal Teknik Elektro dan Komputer, 9(3), 181–188. https://journal.unsrat.ac.id/index.php/elekdankom
Mutedi, A., & Tjahjono, B. (2022). Systematic literature review: Preventing SQL injection attacks using tools OWASP CSR Web Application Firewall. Jurnal Informatika Universitas Pamulang, 7(1), 151–156. https://doi.org/10.32493/informatika.v7i1.17590
Rubiyanto, Selo, & Widyawan, W. (2017). Implementasi role-based access control (RBAC) pada pemanfaatan data kependudukan di tingkat kabupaten. Seminar Nasional Sains dan Teknologi 2017, Fakultas Teknik Universitas Muhammadiyah Jakarta, 1–10. http://jurnal.umj.ac.id/index.php/semnastek
Saroha, L., Octavianto, R., & Sakti, E. M. S. (2024). Pencegahan dan konsep IDS (Intrusion Detection System) dalam mendeteksi serangan siber pada sistem keamanan di Universitas Persada Indonesia Y.A.I. Tekinfo: Jurnal Ilmiah Teknologi Informasi, 25(1), 168–176. https://doi.org/10.37871/tekinfo.v25i1
Sultana, P., Sharma, N., Nalini, N., Pathak, G., & Pandey, A. (2023). Prevention of SQL injection using a comprehensive input sanitization methodology. In Recent Developments in Electronics and Communication Systems. IOS Press. https://doi.org/10.3233/ATDE221269
Suyanto, S. (2012). Keamanan database menggunakan metode enkripsi. Jurnal Ilmiah MATRIK, 14(2), 137–150.
Ujung, A. M., & Nasution, M. I. P. (2023, Juli). Pentingnya sistem keamanan database untuk melindungi data pribadi. JISKA: Jurnal Sistem Informasi dan Informatika, 1(2), 44–47. http://jurnal.unidha.ac.id/index.php/jteksis
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Jurnal Manajemen Bisnis Era Digital

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.