cover
Contact Name
Eri Sasmita Susanto
Contact Email
eri.sasmita.susanto@uts.ac.id
Phone
+6287739570750
Journal Mail Official
jurnal.informatika@uts.ac.id
Editorial Address
Jln. Raya Olat Maras, Batu Alang, Kec. Moyo Hulu, Kab. Sumbawa Besar, Nusa Tenggara Barat. 84371
Location
Kab. sumbawa,
Nusa tenggara barat
INDONESIA
Jurnal Informatika Teknologi dan Sains (Jinteks)
ISSN : -     EISSN : 26863359     DOI : https://doi.org/10.51401/jinteks.v3i3.1260
Jurnal Informatika Teknologi dan Sains (JINTEKS) merupakan media publikasi yang dikelola oleh Program Studi Informatika, Fakultas Teknik dengan ruang lingkup publikasi terkait dengan tema tema riset sesuai dengan bidang keilmuan Informatika yang meliputi Algoritm, Software Enginering, Network & Security serta Artificial Inteligence. disamping itu Jurnal Informatika Teknologi dan Sains (JINTEKS) juga mengelola publikasi yang terkait dengan ilmu Keteknikan / Engineering dan bidang sains yang meliputi matematika komputasi, Biomatematika serta Fisika terapan yang mengarah pada komputasi. Tujuan dan Lingkup Jurnal Jurnal Informatika Teknologi Dan Sains (JINTEKS) akan memuat hasil-hasil penelitian dan pengabdian masyarakat dalam bidang Teknologi Informasi, Komputer dan Sains yang belum pernah diterbitkan maupun sedang dikirim ke jurnal lain. Lingkup Jurnal Informatika Teknologi Dan Sains (JINTEKS) meliputi bidang Teknologi Informasi, Komputer dan Sains yang meliputi: Pemrograman Database Kecerdasan buatan Jaringan komputer Teknologi cloud Interfacing Sistem embedded Pengolahan citra E-commerce Sistem pengambilan keputusan Komputer Sains serta bidang-bidang lain yang relevan dengan teknologi informasi dan komputer
Articles 32 Documents
Search results for , issue "Vol 4 No 4 (2022): EDISI 14" : 32 Documents clear
PENERAPAN KEAMANAN DATA DENGAN MENGGUNAKAN METODE CAESAR CHIPER UNTUK MENGAMANKAN DATABASE MYSQL Meriska Hamni; Muhammad Khairul Amri; Sherly Rezeky; Adnan Buyung Nasution
Jurnal Informatika Teknologi dan Sains (Jinteks) Vol 4 No 4 (2022): EDISI 14
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (175.8 KB) | DOI: 10.51401/jinteks.v4i4.2196

Abstract

Security issues are not a concern for most database managers. Despite the fact that database security is very important because data can be stolen from databases that have no security. In addition, the database can be accessed directly by opening a database application such as MySQL which can be opened on localhost, making it easier for thieves or information destroyers to change or damage it and browse the database directly. Database security previously relied solely on authentication systems, which had the disadvantage that someone could find out passwords and cause identity impersonation. Cryptography is the method that researchers use in this regard. It is anticipated that the contents of the MySQL database will receive increased security thanks to the Caesar Cipher method. By using the MySQL database application and the Visual Basic 2010 application program, a program can be created that can secure the MySQL database. The benefit is that the application can protect data sets with two easy-to-use code techniques. However, security is very good. Naturally, the goal is to protect the MySQL database from information thieves.
PERBANDINGAN TOOLS SQL SUS, SQL NINJA, DAN THE MOLE DALAM PENERAPAN SQL INJECTION Gusti Ayu Mas Ekayanti; Dewa Ayu Deby Cintiya; Putu Yoga Suartana; Rama Ngurah Putera Pinatih; Gede Arna Jude Saskara; I Made Edy Listartha
Jurnal Informatika Teknologi dan Sains (Jinteks) Vol 4 No 4 (2022): EDISI 14
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (199.046 KB) | DOI: 10.51401/jinteks.v4i4.2201

Abstract

In this modern era, the rapid development of science and technology is certainly very beneficial for human life. However, this development can also bring threats, such as cyber attacks. One type of cyber attack that is often used is SQL injection, which targets database security. Three tools that can be used in testing SQL injection are SQL sus, SQL ninja, and The mole. Testing these three tools uses two operating systems, that is Kali Linux and Windows. The test results are measured based on several parameters, namely, the speed of the tool in responding to commands, the number of stages in its application, the features contained therein, and its efficiency. Based on the test results, it is known that only the sus SQL tool successfully injected a website, while the other two tools failed.

Page 4 of 4 | Total Record : 32