scholarly journals PENERAPAN ARSITEKTUR THREE-TIER TERHADAP OPTIMALISASI KEAMANAN DISTRIBUTED DATABASE

CCIT Journal ◽  
2010 ◽  
Vol 3 (3) ◽  
pp. 345-365
Author(s):  
Muhammad Yusup ◽  
Untung Rahardja ◽  
Eko Prasetiyani

Seiring dengan kemcjuan teknologi informasi dan laju perkembangannya yang semakin pesat mendorong adanya perkembangan tingkat keamanan pada sistem database server. Tingkat keamanan tersebut ditir jau dari berbagai tier, baik pada Application Tier, Database Tier, maupun Network Tier. Namun penerapan keamanan sistem database server saat ini baru sebatas pada Application Tier saja, misalnya penerapan hak akses user dengan 1P Token, IP Address, Mac Address serta Global Password Management (GPM) pada server RME. Untuk keamanan Network Tier sudah diatur melalui router, tetapi keamanan dari Database Tier belum disentuh dengan baik. Saat ini Server RME masih menggunakan konsep Two-Tier, yaitu antara Database Tier dan Application Tier masih berada dalam satu server, menggunakan Windows Authentication sebagai hak akses user pada sisi database. Sehingga penerapan tersebut tentunya sangat rentan terhadap keamanan sistem database server, dimana perintah-perintah SQL yang dijalankan oleh user sulit untuk dikendalikan karena belum diterapkannya User Mapping dan Server Roles pada database. Dari permasalahan tersebut maka server RME dengan konsep Two-Tier perlu dioptimalkan karena dapat memberikan dampak yang cukup signifikan terhadap kelangsungan 4 (empai) pilar IT E-learning di lingkungan Perguruan Tinggi Rahai ja. Untuk mengatasi hal tersebut maka dibutuhkan suatu konsep Three-Tier yang diterapkan pada server iRME. Dengan menggunakan Three-Tier, memungkinkan adanya pemisahan secara fisik antara Database Tier dan Application Tier pada server yang berbeda sehingga diharapkan dapat meningkatkan keamanan pada sisi database server. Arsitektur ini memiliki potensi untuk apkan backup server jika Application Tier mengalami masalah, memungkinkan juga diterapkan mirroring pada server iRME sebagai pengembangan lanjutan. Dapat disimpulkan bahwa dengan konsep Three-Tier ini dapat menjadi sebuah solusi terkini dalam meningkatkan keamanan database server di lingkungan Perguruan Tinggi Raharja.

2015 ◽  
Vol 47 (3) ◽  
pp. 150
Author(s):  
Inna V. Herasymenko

This article focuses on data protection in the support systems of distance learning. Different security tools such as hardware, software, transformation security and organizational protection are considered. There are analyzed key places that require protection and suggested possible options for their protection, such as the use of CAPTCHA for registration, protection for the IP-address and service of copy protection. Testing of the proposed security tools was piloted in terms of e-learning course "Information Technologies of Systems Analysis".


Author(s):  
W.G. Aref ◽  
A.C. Catlin ◽  
A.K. Elmagarmid ◽  
J. Fan ◽  
J. Guo ◽  
...  

2016 ◽  
Vol 53 (3) ◽  
pp. 150
Author(s):  
Oleksandr A. Shcherbyna

The purpose of the article is to analyze features of the new standard of e-learning software - Experience API (xAPI), previously also known as the Tin Can API. The standard defines a way of interaction between xAPI-clients – software which students work with while e-learning process, and xAPI-servers – Learning Record Stores (LRS), which store data about their results. Standard also defines LRS data representation format and a way of data transfers between LRS, which makes it possible to combine several LRS into distributed database that could accumulate information about people training in formal, non-formal and informal education throughout life. The article contains review of available xAPI-clients, xAPI-servers, and the results of their testing, which prove the possibility of their usage in our educational institutions.


2018 ◽  
Vol 9 (1) ◽  
pp. 83-86
Author(s):  
Katalin Ferencz

Abstract The wide spread of IoT devices makes possible the collection of enormous amounts of sensor data. Traditional SQL (structured query language) database management systems are not the most appropriate for storing this type of data. For this task, distributed database management systems are the most adequate. Apache Cassandra is an open source, distributed database server software that stores large amounts of data on low-coast servers, providing high availability. The Cassandra uses the gossip protocol to exchange information between the distributed servers. The query language used is the CQL (Cassandra Query Language). In this paper we present an alternative solution to traditional SQL-based database management systems - the so called NoSQL type database management systems, summarize the main types of these systems and provide a detailed description of the Apache Cassandra open source distributed database server installation, configuration and operation.


2019 ◽  
Author(s):  
yuda fahrozi

Database Server adalah sebuah program komputer yang menyediakan layanan pengelolaan basis data dan melayani komputer atau program aplikasi basis data yang menggunakan model klien/server. Istilah ini juga merujuk kepada sebuah komputer (umumnya merupakan server) yang didedikasikan untuk menjalankan program yang bersangkutan. Sistem manajemen basis data (SMBD) pada umumnya menyediakan fungsi-fungsi server basis data, dan beberapa SMBD (seperti halnya MySQL atau Microsoft SQL Server) sangat bergantung kepada model klien-server untukmengakses basis datanya.Legenda Terbentuknya Istilah DatabaseIstilah “database” berawal dari ilmu komputer. Meskipun kemudianartinya semakin luas, memasukkan hal-hal di luar bidang elektronika, artikel inimengenai database komputer. Catatan yang mirip dengan database sebenarnyasudah ada sebelum revolusi industri yaitu dalam bentuk buku besar, kuitansi dan kumpulan data yang berhubungan dengan bisnisJenis DatabaseTerdapat 12 tipe database, antara lainOperational database,Analytical database,Data warehouse,Distributed database,End-user database,External database,Hypermedia databases on the web,Navigational database,In-memory databases,Document-oriented databases,Real-time databases,danRelational Database.Kata Kunci : Kapasitas Server Dan Data Base


2021 ◽  
Vol 4 (1) ◽  
pp. 70-79
Author(s):  
Nindia Kusworo ◽  
Yerry Soepriyanto ◽  
Arafah Husna
Keyword(s):  

2014 ◽  
Vol 971-973 ◽  
pp. 1920-1923
Author(s):  
Jun Liu ◽  
Yu Sun ◽  
Zhi Zhen Chen ◽  
Yan Liu ◽  
Lin Su ◽  
...  

According to the characteristics of the tea product traceability and monitoring system, the master-slavedatabase architecture is adopted. Based on Amoeba frame, the separation technology of reading and writing isachieved. Experimental results show that the design of master-slave distributed database is correct. And the achievement of separation technology of reading and writing effectively implement a distributed data managementto improve data processing efficiency.


2013 ◽  
Vol 378 ◽  
pp. 510-513 ◽  
Author(s):  
Hong Ji

DNS service plays a very important role in the Internet; each host must pass it to query the IP address of the destination host, and can communicate with each other. DNS uses a distributed database structure and server/client mode, which is stored domain name in the server and allowed a client to access the required data. DNS can resolve the host name to the corresponding IP address, while it also can resolve IP address to a host name. With the development of information technology, the network attacks become more and more frequent occurrence in the Internet. So DNS system has suffered a series of attacks frequently, and the communication is severely affected in the Internet. Therefore, the security problems of DNS are increasingly concerned about. The paper describes the composition, features and working principle of DNS system. According to the security risks of the system, it proposes the corresponding security strategy and designs a reliable and safe DNS.


Sign in / Sign up

Export Citation Format

Share Document