The Effectiveness of Parameterized Queries in Preventing SQL Injection Attacks at Go - Dalam bentuk pengganti sidang - Artikel Jurnal

RIZALDI FATAH SIDIK

Informasi Dasar

213 kali
24.04.181
621.389 28
Karya Ilmiah - Skripsi (S1) - Reference

SQL Injection attacks are one of the common security risks that occur in applications. SQL Injection cases can lead to data and sensitive information leaks, and even potential application data deletion. This research examines the effectiveness of using parameterized queries in the Go programming language as a method of prevention against SQL Injection attacks. Go provides the feature of parameterized queries by using placeholders such as question marks (?) or parameter names. Parameterized queries separate input values from SQL statements and are executed securely by the database driver. In this study, the use of parameterized queries in Go is evaluated to prevent query manipulation by users in the application. The research is conducted by testing four HTTP request operations: GET, POST, PUT, and DELETE, both before and after the use of parameterized queries. The testing results, based on Acunetix Web Vulnerability scanning, prove that all testing operations are vulnerable to SQL Injection when not using parameterized queries, while successfully mitigating SQL Injection attacks when using parameterized queries in Go.

 

Subjek

CYBER SECURITY
EFFECTIVENESS,

Katalog

The Effectiveness of Parameterized Queries in Preventing SQL Injection Attacks at Go - Dalam bentuk pengganti sidang - Artikel Jurnal
 
 
Inggris

Sirkulasi

Rp. 0
Rp. 0
Tidak

Pengarang

RIZALDI FATAH SIDIK
Perorangan
Syifa Nurgaida Yutia, Rana Zaini Fathiyana
 

Penerbit

Universitas Telkom, S1 Teknologi Informasi - Jakarta - Pindahan
Bandung
2024

Koleksi

Kompetensi

 

Download / Flippingbook

 

Ulasan

Belum ada ulasan yang diberikan
anda harus sign-in untuk memberikan ulasan ke katalog ini