DATA SECURITY STRATEGY BASED ON STORED PROGRAMS: A CASE STUDY OF DSS FOR TEACHING ASSISTANT SELECTION

Authors

  • Prahenusa Wahyu Ciptadi Universitas PGRI Yogyakarta
  • Tri Hastono Universitas PGRI Yogyakarta
  • Gema Kharismajati Universitas PGRI Yogyakarta
  • Firdiyan Syah Universitas PGRI Yogyakarta
  • Nayaka Anung Fahriza Universitas PGRI Yogyakarta

DOI:

https://doi.org/10.61677/jth.v2i3.371

Keywords:

Data security strategy, stored programs, DSS teaching assistant selection

Abstract

Data security is becoming increasingly crucial in information system management, especially in academic environments that handle sensitive information. The reliance on digital systems demands the protection of data integrity, confidentiality, and availability. High-level data security is also required in the Decision Support System (DSS) application for selecting Teaching Assistants at Universitas PGRI Yogyakarta. The DSS helps determine candidates based on GPA, experience, and skills. However, this system is vulnerable to threats such as unauthorized data modifications, access abuse, SQL Injection, and cyber-attacks that can impact decision-making. Stored Programs in databases provide an effective solution to enhance data security. This research aims to design Stored Programs as a security strategy for data input into database tables. The types of Stored Programs designed in this study include Stored Procedures, Functions, and control programs. The design methodology for the Stored Programs follows the waterfall method. The test results indicate that the Stored Programs function as expected and execute in a very short time. The execution of Stored Programs takes only 0.0059 seconds.

References

Aulia, C. P., Pratama, M. Y., & Dewi, H. L. (2023). Perbandingan Performa Query Select Dasar, View, Dan Stored Procedure Pada Database Mysql. Prosiding Seminar Nasional Teknologi dan Sistem Informasi, 3(1), 456–464. https://doi.org/10.33005/sitasi.v3i1.413

Dm, M. Y., Agustantia, M., & Zulaiha, S. (n.d.). Tindak Pidana Kejahatan Pemalsuan data (Data Forgery) dalam Bentuk Kejahatan Siber (Cyber Crime). Jurnal Pendidikan dan Konseling, 4(6), 6635–6640. https://doi.org/10.31004/jpdk.v4i6.9365

Fathulloh, A. H., & Adauwiyah, H. I. (2021). Perbandingan Tingkat Efisiensi Waktu Query SELECT pada Database Interface Navicat dan SQLYog di MySQL DBMS. Applied Information System and Management (AISM), 4(2), 101–105. https://doi.org/10.15408/aism.v4i2.18369

Firdaus, M. (2024). Penerapan Stored Procedure untuk Memudahkan Modifikasi dan Update Formula Logic pada ETL. Remik: Riset dan E-Jurnal Manajemen Informatika Komputer, 8(3). https://doi.org/10.33395/remik.v8i3.13752

Hartono, N. (2021). Comparison of Stored Procedures on Relational Database Management Systems. JOURNAL TECH-E, 4(2), 8–15. https://doi.org/10.31253/te.v4i2.529

Information Functions. (n.d.). [MySQL Official Website]. Information Functions. Retrieved January 23, 2025, from https://dev.mysql.com/doc/refman/8.4/en/information-functions.html#function_row-count

Kuntadi, A., & Feriandi, Y. (2023). Penggunaan SQL Server dalam Pengolahan Data Warehouse yang Praktis dan Berkelanjutan. Jurnal Algoritma, 20(2), 457–468. https://doi.org/10.33364/algoritma/v.20-2.1522

Putri, C. A., Melan, M., Ulgina, S., Lestari, A., Firmansyah, D., & Zaliman, I. (2024). Meningkatkan Kesadaran Dan Pemahaman Mengenai Keamanan Data Pribadi Melalui Kegiatan Sosialisasi Di SMPN 2 Merawang. IJDe: Indonesian Journal of Dedication and Education, 3(1), 18–23. https://doi.org/10.33019/ijde.v3i1.50

Rathore, S., & Sharma, A. (2017). Database Security- Attacks, Threats and Challenges. International Journal of Engineering Research, 5(10), 1–4. https://doi.org/10.17577/IJERTCONV5IS10008

Rohmana, A. D. A., Mubarok, H., & Gunawan, R. (2019). Pengukuran Kinerja Stored Procedure Pada Database Relasional. Jurnal Siliwangi Seri Sains dan Teknologi (Saintek), 5(2), 51–55. https://doi.org/10.37058/jssainstek.v5i2.1197

Saputra, D. F. (2023). Literasi Digital Untuk Perlindungan Data Pribadi. Jurnal Ilmu Kepolisian, 17(3), 1–8. https://doi.org/10.35879/jik.v17i3.454

Satria, A., Ulina, N. P. H., Safira, P., & Pangestu, B. (2024). Perspektif Hukum Terhadap Keamanan Data: Tantangan Dan Solusi Di Era Teknologi Informasi. Warta Dharmawangsa, 18(1), 177–192. https://doi.org/10.46576/wdw.v18i1.4264

Sidharta, K., & Wibowo, T. (2020). Studi Efisiensi Sumber Daya Terhadap Efektivitas Penggunaan Database : Studi Kasus Sql Server Dan. 1(1), 508–515.

Triyono, J. (2023). Penerapan Hak Akses pada Perancangan Database Akademik untuk Meningkatkan Keamanan Data: Application of Access Rights in Academic Database Design to Improve Data Security. MALCOM: Indonesian Journal of Machine Learning and Computer Science, 3(1), 50–59. https://doi.org/10.57152/malcom.v3i1.747

Ujung, A. M., & Nasution, M. I. P. (2023). Pentingnya Sistem Keamanan Database Untuk Melindungi Data Pribadi. Jurnal Sistem Informasi Dan Informatika, 1(2), 44–47. https://doi.org/10.47233/jiska.v1i2.929

Yolanda Sari Ks, Madiasa Ablisar, Mahmud Mulyadi, & Jelly Leviza. (2022). Analisis Yuridis Terhadap Tindak Pidana Manipulasi Informasi Pengguna E-Commerce Menurut Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik Studi Putusan No. 542/Pid.Sus/2019/PN.Mlg. Locus: Jurnal Konsep Ilmu Hukum, 2(2), 53–67. https://doi.org/10.56128/jkih.v2i2.22

Downloads

Published

2024-09-29

How to Cite

Ciptadi, P. W., Tri Hastono, Kharismajati, G., Syah, F., & Fahriza, N. A. (2024). DATA SECURITY STRATEGY BASED ON STORED PROGRAMS: A CASE STUDY OF DSS FOR TEACHING ASSISTANT SELECTION. JTH: Journal of Technology and Health, 2(3), 58–68. https://doi.org/10.61677/jth.v2i3.371