Informasi Umum

Kode

24.04.181

Klasifikasi

621.389 28 - Security Electronics

Jenis

Karya Ilmiah - Skripsi (S1) - Reference

Subjek

Cyber Security, Effectiveness,

Dilihat

557 kali

Informasi Lainnya

Abstraksi

<p>SQL Injection attacks are one of the common security risks that occur in applications. SQL Injection cases can lead to data and sensitive information leaks, and even potential application data deletion. This research examines the effectiveness of using parameterized queries in the Go programming language as a method of prevention against SQL Injection attacks. Go provides the feature of parameterized queries by using placeholders such as question marks (?) or parameter names. Parameterized queries separate input values from SQL statements and are executed securely by the database driver. In this study, the use of parameterized queries in Go is evaluated to prevent query manipulation by users in the application. The research is conducted by testing four HTTP request operations: GET, POST, PUT, and DELETE, both before and after the use of parameterized queries. The testing results, based on Acunetix Web Vulnerability scanning, prove that all testing operations are vulnerable to SQL Injection when not using parameterized queries, while successfully mitigating SQL Injection attacks when using parameterized queries in Go.</p>

<p style="margin-left:70.85pt;"> </p>

Koleksi & Sirkulasi

Tersedia 1 dari total 1 Koleksi

Anda harus log in untuk mengakses flippingbook

Pengarang

Nama RIZALDI FATAH SIDIK
Jenis Perorangan
Penyunting Syifa Nurgaida Yutia, Rana Zaini Fathiyana
Penerjemah

Penerbit

Nama Universitas Telkom, S1 Teknologi Informasi - Jakarta - Pindahan
Kota Jakarta
Tahun 2024

Sirkulasi

Harga sewa IDR 0,00
Denda harian IDR 0,00
Jenis Non-Sirkulasi