Analisis Keamanan Database dalam Menghadapi Ancaman Kebocoran Data di Perusahaan Teknologi Informasi

Authors

  • Nisa Alifatuzzahra Universitas Islam Negeri Sumatera Utara Medan

DOI:

https://doi.org/10.59841/ignite.v3i3.2957

Keywords:

Cyber Security Threats, Database Security, Data Breach, Access Control, Data Encryption

Abstract

Information technology companies rely heavily on databases to store critical data that is vulnerable to leaks that can be financially and reputationally detrimental. This study aims to analyze the effectiveness of database security mechanisms, especially encryption and access control, in preventing data leaks. The method used is a case study with a qualitative approach through observation and interviews at information technology companies, as well as technical analysis of database protection implementation. The results of the study show that to maintain data security, companies need to use end-to-end encryption and a biometric login system so that only authorized people can access it. Smart technology such as AI is also important for detecting threats quickly. In addition, using special tools to monitor devices and routinely test security helps reduce risks. No less important, providing security training to employees so that they are more vigilant and do not become a gap for data leaks. In this way, companies can be better prepared to face various threats in today's digital era.

 

References

Arfan Dwi Madya, Bagas Djoko Haryanto, & Devi Putri Ningsih. (2023). Keefektifan Metode Proteksi Data dalam Mengatasi Ancaman Cybersecurity. Indonesian Journal of Education And Computer Science, 1(3), 127–135. https://doi.org/10.60076 /indotech.v1i3.236

Daulay, A. P. E., Febriana, V., Kita, A. D. A., Gunawan, S., & Nurbaiti, N. (2023). Keamanan dalam Sistem Database Sebagai Sumber Informasi Manajemen Terhadap Perlindungan Data. Edu Society: Jurnal Pendidikan, Ilmu Sosial Dan Pengabdian Kepada Masyarakat, 3(2), 988–991. https://doi.org/10.56832/edu.v3i2.357

Fitri, M. A., & Nasution, M. I. P. (2024). Taktik Canggih untuk Memastikan Keamanan Data Perusahaan dan Mengatasi Ancaman Kebocoran Data di Masa Depan. Journal of Sharia Economics Scholar (JoSES), 2(2), 113–121.

Hapsah, Z. F., & Nasution, M. I. P. (2023). Analisis Tingkat Keamanan Data Perusahaan Yang Rentan Terhadap Serangan Cyber Dalam Sistem Informasi Manajemen. Jurnal Manajemen Dan Akuntansi, 1(2), 338–343.

Lesmana, R., & Nasution, M. I. P. (2025). Kebocoran Data di Media Sosial : Analisis Pola dan Strategi Pencegahannya. Socius: Jurnal Administrasi Publik Volume, 2(10), 123–128.

Nasution, R. S. U. S. & M. I. P. (2024). Cara Mengidentifikasi dan Menghindari Kebocoran Data. Kohesi: Jurnal Multidisiplin Saintek Volume, 3(7).

Putra Rahmadi, & Hilda Dwi Yunita. (2020). Implementasi Pengamanan Basis Data Dengan Teknik Enkripsi. Jurnal Cendikia, 19(1), 413–418.

Rony, H. & M. A. (2018). Implementasi Keamanan Database Dengan Enggunakan Metode Advanced Encryption Standard (Aes-256) Pada Sekolah Smk Islam Al Hikmah Jakarta Berbasis …. Skanika, 1(3), 1137–1142. Retrieved from http:// jom.fti.budiluhur.ac.id/index.php/SKANIKA/article/view/2537

Ujung, A. M., Irwan, M., & Nasution, P. (2023). Pentingnya Sistem Keamanan Database untuk melindungi data pribadi. JISKA: Jurnal Sistem Informasi Dan Informatika, 1(2), 44. Retrieved from http://jurnal.unidha.ac.id/index.php/jteksis

Warniwati, T., Kedua, Z., Zebua, J. A., Informasi, T., Sains, F., & Nias, U. (2024). Analisis Keamanan Sistem Informasi Pada Perusahaan E-Commerce Di Indonesia. 01 (November), 68–75.

Downloads

Published

2025-06-25

How to Cite

Nisa Alifatuzzahra. (2025). Analisis Keamanan Database dalam Menghadapi Ancaman Kebocoran Data di Perusahaan Teknologi Informasi. Journal Islamic Global Network for Information Technology and Entrepreneurship, 3(3), 11–22. https://doi.org/10.59841/ignite.v3i3.2957

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.