IMPLEMENTASI AES 256 UNTUK PENCEGAHAN SQL INJECTION DI PARAMETER ALAMAT URL DI TAHAP PREPARE STATEMENT

With the rapid advancement of web technology, some individual activities are carried out there. So that web applications become important as a support for individual activities on the internet in their daily lives. The danger of data leakage on websites due to SQL injection is often encountered case...

Full description

Saved in:
Bibliographic Details
Main Author: Sabilillah Fauzal Addim, (Author)
Format: Book
Published: 2023-12-19.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_27817
042 |a dc 
100 1 0 |a Sabilillah Fauzal Addim, .  |e author 
245 0 0 |a IMPLEMENTASI AES 256 UNTUK PENCEGAHAN SQL INJECTION DI PARAMETER ALAMAT URL DI TAHAP PREPARE STATEMENT 
260 |c 2023-12-19. 
500 |a http://repository.upnvj.ac.id/27817/13/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/27817/26/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/27817/3/BAB%20I.pdf 
500 |a http://repository.upnvj.ac.id/27817/4/BAB%20II.pdf 
500 |a http://repository.upnvj.ac.id/27817/5/BAB%20III.pdf 
500 |a http://repository.upnvj.ac.id/27817/6/BAB%20IV.pdf 
500 |a http://repository.upnvj.ac.id/27817/7/BAB%20V.pdf 
500 |a http://repository.upnvj.ac.id/27817/8/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/27817/9/RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/27817/10/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/27817/11/HASIL%20PLAGIARISME.pdf 
500 |a http://repository.upnvj.ac.id/27817/12/ARTIKEL%20KI.pdf 
520 |a With the rapid advancement of web technology, some individual activities are carried out there. So that web applications become important as a support for individual activities on the internet in their daily lives. The danger of data leakage on websites due to SQL injection is often encountered cases and even according to the OWASP organization which is a community that discusses web applications determines that the threat of SQL injection is in 3rd place out of the top 10. The way this threat works is because the results of user input to the application are displayed in a clear and invalidated manner, this can potentially be used as an injection area for malicious SQL statements that function to extract data from the database. Therefore, the threat of SQL injection attacks has a great impact because the attacker can gain access rights to the website database and information on the website like a legitimate user. This paper presents an approach to identify and secure the values or contents in the parameters placed in the URL address highlighting 2 aspects: the first is to make the parameter values or contents confidential by encryption and the second step is to prepare SQL statements to keep the SQL query from becoming a malicious query and ensure that the parameter values bound in the query have appropriate data types and are modified in a safe form so that they are eligible for execution. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a QA75 Electronic computers. Computer science 
690 |a QA76 Computer software 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/27817/ 
787 0 |n http://repository.upnvj.ac.id/ 
856 4 1 |u http://repository.upnvj.ac.id/27817/  |z Link Metadata