Database Vulnerability Analysis of North Aceh e-Kinerja Website Using SQL Injection

Authors

  • Fidyatun Nisa Universitas Malikussaleh, Indonesia
  • Muhammad Ikhwani Universitas Malikussaleh, Indonesia
  • Nanda Sitti Nurfebruary Universitas Malikussaleh, Indonesia
  • Siti Nayla Husna Universitas Malikussaleh, Indonesia

DOI:

https://doi.org/10.47709/brilliance.v5i2.6780

Keywords:

Information Security, SQL Injection, e-Kinerja, Blackbox Testing, ISSAF

Abstract

The rapid advancement of information technology has significantly increased the risk of cyber threats, particularly in web-based systems. One of the most common attack techniques used to exploit vulnerabilities in web applications is SQL injection, which can result in sensitive data leakage and system compromise. This study aims to evaluate the database security of the E-Kinerja website of North Aceh Regency against SQL injection attacks using a black-box penetration testing approach. The assessment is conducted based on the Information Systems Security Assessment Framework (ISSAF), which provides a structured and systematic methodology for comprehensive security evaluation. The testing process includes several stages, namely planning and preparation, information gathering, network mapping, vulnerability identification, and penetration testing, utilizing tools such as SQLMap and OWASP ZAP. The results indicate that the target website is not vulnerable to SQL injection attacks, as no exploitable parameters were identified during testing. This is largely due to the implementation of security mechanisms such as Web Application Firewall (WAF) and Intrusion Prevention System (IPS), which effectively detect and prevent unauthorized access attempts. This study highlights the importance of implementing layered security strategies and continuously updating security protocols to address emerging cyber threats. The findings contribute to improving database security awareness and provide practical recommendations for strengthening the resilience of information systems in the government sector.

References

Abdul Gafur, dan. (2023). PENERAPAN SISTEM KINERJA BERBASIS E-KINERJA PADA PEMERINTAHAN KOTA BEKASI IMPLEMENTATION OF E-KINERJA BASED PERFORMANCE SYSTEM ASSESSMENT IN BEKASI CITY GOVERNMENT. Jurnal Administrasi Negara, 29(1).

Akhlia, Y. H. (2025). ISSAF-based penetration testing on e-commerce systems.

Alenezi, M., et al. (2021). Web application security vulnerabilities and prevention techniques. Journal of Cyber Security Technology, 5(2), 45–60.

Annas, M., Adek, R. T., & Afrillia, Y. (2024). Web application firewall design for cyber attack prevention.

Fitria, R. (2020). The Attacking Methods Involved in Current Trend Environment. Jurnal Teknologi Terapan Sains 4.0, 2(1)

Gusty, R. et al. (n.d.). Penerapan Sistem Informasi Sumber Daya Manusia Pada Program E. In Jurnal Administrasi Politik dan Sosial (Vol. 1). Retrieved from https://japs.ejournal.unri.ac.id/index.php/JAPS

Kumar, R., Singh, P., & Sharma, V. (2022). Intrusion prevention systems: A comprehensive study. International Journal of Network Security, 24(1), 12–25.

Nazaruddin, I. F. (2024). Security analysis of e-ticketing systems using ISSAF

Nisa, F., Nurfebruary, N. S., & Ikhwani, M. (2024). Analysis of academic portal website security using OWASP ZAP. Jurnal Nasional Komputasi dan Teknologi Informasi, 7(6)

Pratama, Y., et al. (2021). Cybersecurity awareness in government systems. Journal of Digital Governance, 3(1), 10–18.

Putra, R., et al. (2023). Penetration testing in public sector applications. Indonesian Journal of Information Systems, 8(2), 99–110.

Rahman, M., et al. (2022). Black-box penetration testing approach for web applications. IEEE Access, 10, 112233–112245.

Singh, A., & Sharma, K. (2021). Web application firewall effectiveness in cyber defense. Journal of Information Security, 12(3), 150–162.

Umar, R., Riadi, I., & Ihya, M. (2023). ISSAF framework for information system security assessment. Jurnal Teknologi Informasi, 12(1), 280–292.

Wibowo, A., et al. (2024). Security analysis of web applications using ISSAF. Journal of Information Systems Research, 15(1), 22–35.

Downloads

Published

2025-12-29

How to Cite

Nisa, F., Ikhwani, M., Nurfebruary, N. S., & Husna, S. N. (2025). Database Vulnerability Analysis of North Aceh e-Kinerja Website Using SQL Injection. Brilliance: Research of Artificial Intelligence, 5(2), 1288–1294. https://doi.org/10.47709/brilliance.v5i2.6780

Similar Articles

<< < 4 5 6 7 8 9 10 11 12 13 > >> 

You may also start an advanced similarity search for this article.