Strategi Keamanan Data dalam Database Relasional : Tinjauan Literatur

Authors

  • Dwi Amanda Tanjung Universitas Islam Negeri Sumatera Utara
  • Muhammad Irwan Padli Nasution Universitas Islam Negeri Sumatera Utara

DOI:

https://doi.org/10.61132/jumabedi.v2i2.518

Keywords:

Data Encryption, IDS, RBAC, Relational Database Security, SQL Injection

Abstract

Relational databases, an essential component in modern information systems, are vulnerable to various security threats, both internal such as abuse of access rights, and external such as SQL injection, malware, and hacking. Given these conditions, how can relevant mitigation strategies be implemented to protect data security in relational databases? This article aims to identify the main threats to relational database security and map out relevant mitigation strategies. The method used is a literature review of various recent scientific journals that discuss aspects of data security in the context of relational databases. The results of the review indicate that threats such as SQL injection can be overcome by strict input validation, abuse of access rights can be prevented through role-based access control (RBAC), malware attacks can be detected using an intrusion detection system (IDS), and hacking actions can be minimized through the implementation of data encryption. This study is expected to be a reference in designing effective security strategies to protect data in relational databases.

Downloads

Download data is not yet available.

References

Aditya, A. R. M., Putri, A. W. O. K., Musthofa, D. L., & Widodo, P. (2022). Serangan hacking tools sebagai ancaman siber dalam sistem pertahanan negara (studi kasus: Predator). Global Political Studies Journal, 6(1), 35–46. https://doi.org/10.34010/gpsjournal.v6i1

Agustin, R., Fitri, I., & Nathasia, N. D. (2018). Implementasi metode Intrusion Detection Systems (IDS) dan Intrusion Prevention System (IPS) berbasis Snort server untuk keamanan jaringan LAN. Jurnal Informatika, 18(1), 71–82.

Aljanabi, M., Ismail, M. A., & Ali, A. H. (2021). Intrusion detection systems, issues, challenges, and needs. International Journal of Computational Intelligence Systems. https://doi.org/10.2991/ijcis.d.210105.001

Asriyanik. (2017). Studi terhadap Advanced Encryption Standard (AES) dan algoritma Knapsack dalam pengamanan data. Jurnal SANTIKA: Jurnal Ilmiah Sains dan Teknologi, 7(1), 553–560.

Fitria, K. M. (2023). Analisis serangan malware dalam perbankan dan perencanaan solusi keamanan. Jurnal Informatika dan Teknik Elektro Terapan, 11(3), 721–731. https://doi.org/10.23960/jitet.v11i3.3312

Gemawaty, C. A., & Yuliani, Y. (2024). Manajemen Identitas dan Akses dalam Keamanan Sistem Informasi (Pendekatan literature review). Jurnal Manajemen Informatika Jayakarta, 4(4), 396–403. https://doi.org/10.52362/jmijayakarta.v4i4.1527

Hasibuan, S. H., & Nasution, M. I. P. (2023). A comparative study of relational and NoSQL database for big data analytics. Jurnal Pendidikan, Sains dan Teknologi (JPST), 2(3), 513–516. http://jurnal.minarits.com/index.php/jpst/

Hermawan, A., & Ujianto, E. I. H. (2021). Implementasi enkripsi data menggunakan kombinasi AES dan RSA. InfoTekJar: Jurnal Nasional Informatika dan Teknologi Jaringan, 5(2), 326–330. https://doi.org/10.30743/infotekjar.v5i2.3585

Jemal, I., Cheikhrouhou, O., Hamam, H., & Mahfoudhi, A. (2020). SQL injection attack detection and prevention techniques using machine learning. International Journal of Applied Engineering Research.

Manoppo, V. A., Lumenta, A. S. M., & Karouw, S. D. S. (2020). Analisa malware menggunakan metode dynamic analysis pada jaringan Universitas Sam Ratulangi. Jurnal Teknik Elektro dan Komputer, 9(3), 181–188. https://journal.unsrat.ac.id/index.php/elekdankom

Mutedi, A., & Tjahjono, B. (2022). Systematic literature review: Preventing SQL injection attacks using tools OWASP CSR Web Application Firewall. Jurnal Informatika Universitas Pamulang, 7(1), 151–156. https://doi.org/10.32493/informatika.v7i1.17590

Rubiyanto, Selo, & Widyawan, W. (2017). Implementasi role-based access control (RBAC) pada pemanfaatan data kependudukan di tingkat kabupaten. Seminar Nasional Sains dan Teknologi 2017, Fakultas Teknik Universitas Muhammadiyah Jakarta, 1–10. http://jurnal.umj.ac.id/index.php/semnastek

Saroha, L., Octavianto, R., & Sakti, E. M. S. (2024). Pencegahan dan konsep IDS (Intrusion Detection System) dalam mendeteksi serangan siber pada sistem keamanan di Universitas Persada Indonesia Y.A.I. Tekinfo: Jurnal Ilmiah Teknologi Informasi, 25(1), 168–176. https://doi.org/10.37871/tekinfo.v25i1

Sultana, P., Sharma, N., Nalini, N., Pathak, G., & Pandey, A. (2023). Prevention of SQL injection using a comprehensive input sanitization methodology. In Recent Developments in Electronics and Communication Systems. IOS Press. https://doi.org/10.3233/ATDE221269

Suyanto, S. (2012). Keamanan database menggunakan metode enkripsi. Jurnal Ilmiah MATRIK, 14(2), 137–150.

Ujung, A. M., & Nasution, M. I. P. (2023, Juli). Pentingnya sistem keamanan database untuk melindungi data pribadi. JISKA: Jurnal Sistem Informasi dan Informatika, 1(2), 44–47. http://jurnal.unidha.ac.id/index.php/jteksis

Downloads

Published

2025-05-27