{"id":10539,"date":"2026-03-30T10:41:34","date_gmt":"2026-03-30T03:41:34","guid":{"rendered":"https:\/\/binus.ac.id\/bekasi\/?p=10539"},"modified":"2026-04-01T11:03:18","modified_gmt":"2026-04-01T04:03:18","slug":"core-of-database-integrity","status":"publish","type":"post","link":"https:\/\/binus.ac.id\/bekasi\/2026\/03\/core-of-database-integrity\/","title":{"rendered":"Core Of Database Integrity"},"content":{"rendered":"<h3><strong>Introduction<\/strong><\/h3>\n<p>In this era of digital transformation, data has become the most valuable intangible asset for an organization or company. However, simply collecting and storing data is not enough. The biggest challenge in data management is ensuring that the data remains accurate, consistent, and secure from various threats. This is where the concept of Database Integrity plays a crucial role. Database integrity is not just a single feature, but a combination of several layers of protection[1]. These layers begin with <strong>Database Security<\/strong> to defend against external threats[2], followed by <strong>Privileges<\/strong> (access control) to prevent internal errors, and are finally safeguarded by <strong>Transaction Control Language (TCL)<\/strong> as a safety net against system failures[3].<\/p>\n<h3><\/h3>\n<h3><strong>Main Discussion<\/strong><\/h3>\n<p><span style=\"font-size: 12pt\"><strong>Database Security<\/strong><\/span><\/p>\n<p>Database security serves as the first line of defense. Its primary focus is to protect the database from unauthorized access, data leaks, and cyberattacks. According to ensuring data integrity requires robust security protocols, including encryption and strict authentication[1]. By implementing these methods, even if a breach occurs, the sensitive data remains unreadable to unauthorized parties, thus maintaining the availability and confidentiality of the system.<\/p>\n<p><strong>Privileges and Access Control<\/strong><\/p>\n<p>Once a user enters the system, the next threat often comes from the inside, such as human error or abuse of power. This is where <strong>Privileges<\/strong> play a role using Data Control Language (DCL)[2]. A secure system applies the Principle of Least Privilege, meaning users are only given the minimum access necessary to do their jobs. This is managed through two main commands:<\/p>\n<ul>\n<li><strong>GRANT:<\/strong> Gives specific permissions to a user (e.g., permission only to read data).<\/li>\n<li><strong>REVOKE:<\/strong> Removes access permissions from a user when they are no longer needed.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Transaction Control Language (TCL)<\/strong><\/p>\n<p>Threats to data integrity do not only come from humans but also from system failures (like power outages or server downtime). <strong>TCL<\/strong> ensures that a database transaction is executed entirely or not at all, following the <strong>ACID<\/strong> (Atomicity, Consistency, Isolation, Durability) principles[3]. The main TCL commands include:<\/p>\n<ul>\n<li><strong>COMMIT:<\/strong> Saves all data changes permanently into the database after a transaction is 100% successful.<\/li>\n<li><strong>ROLLBACK:<\/strong> Undoes all changes and returns the database to its previous safe state if an error occurs during the transaction process.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-10540 aligncenter\" src=\"http:\/\/binus.ac.id\/bekasi\/wp-content\/uploads\/2026\/04\/Picture1-1.png\" alt=\"\" width=\"364\" height=\"182\" \/><\/p>\n<h3><\/h3>\n<h3><strong>Case Study<\/strong><\/h3>\n<p>To understand the importance of these three pillars in the real world, we can look at the ransomware attack on Bank Syariah Indonesia (BSI) in May 2023[4].<\/p>\n<ol>\n<li><strong>Security Aspect:<\/strong> Hackers (LockBit 3.0) managed to breach BSI&#8217;s frontline defense, bypassing network security. This resulted in the theft of 1.5 TB of sensitive customer data and the locking of the banking system.<\/li>\n<li><strong>Privileges Aspect:<\/strong> The attackers successfully escalated their privileges. They gained unauthorized administrative access, allowing them to move laterally through the network and access the core database. This shows why strict privilege management is crucial to contain breaches.<\/li>\n<li><strong>TCL Aspect:<\/strong> During the attack and the subsequent recovery process, the bank&#8217;s core system was shut down. To ensure that no customer transactions (like ongoing fund transfers) were corrupted during the blackout, the IT team had to rely on database backups and transaction logs. They used <strong>ROLLBACK<\/strong> procedures to undo incomplete transactions and ensure the data returned to a consistent state (ACID principles) before safely bringing the system back online.<\/li>\n<\/ol>\n<h3><\/h3>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>achieving true database integrity is not possible through a single security measure; it requires a comprehensive, multi-layered approach. <strong>Database Security<\/strong> acts as the first wall of defense against external cyber threats. Meanwhile, <strong>Privileges<\/strong> and access control ensure that internal users only interact with data they are authorized to handle, preventing internal errors or privilege escalation. Finally, <strong>Transaction Control Language (TCL)<\/strong> serves as the ultimate safety net, guaranteeing data consistency and preventing corruption during unexpected system failures.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 10pt\"><strong>References<\/strong><\/span><\/p>\n<p><span style=\"font-size: 10pt\">[1]\u00a0\u00a0\u00a0\u00a0\u00a0 B. Singh, \u201cINTERNATIONAL JOURNAL OF RESEARCH IN ELECTRONICS AND COMPUTER ENGINEERING A UNIT OF I2OR Ensuring Data Integrity and Availability with Robust Database Security Protocols,\u201d vol. 3.<\/span><\/p>\n<p><span style=\"font-size: 10pt\">[2]\u00a0\u00a0\u00a0\u00a0\u00a0 M. Malik and T. Patel, \u201cDATABASE SECURITY-ATTACKS AND CONTROL METHODS,\u201d International Journal of Information Sciences and Techniques (IJIST), vol. 6, no. 1, 2016, doi: 10.5121\/ijist.2016.6118.<\/span><\/p>\n<p><span style=\"font-size: 10pt\">[3]\u00a0\u00a0\u00a0\u00a0\u00a0 T. Almushaili, \u201cDatabase Management Systems,\u201d International Journal of Engineering Research and Applications www.ijera.com, vol. 12, pp. 80\u201386, 2022, doi: 10.9790\/9622-12118086.<\/span><\/p>\n<p><span style=\"font-size: 10pt\">[4]\u00a0\u00a0\u00a0\u00a0\u00a0 N. Maulana, T. Laurens, H. A. Faiz, and T. Patrianti, \u201cManajemen Krisis PT. BSI Tbk Pasca Peretasan Data Nasabah,\u201d INNOVATIVE: Journal Of Social Science Research, vol. 4, pp. 8244\u20138258, 2024.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In this era of digital transformation, data has become the most valuable intangible asset for an organization or company. However, simply collecting and storing data is not enough. The biggest challenge in data management is ensuring that the data remains accurate, consistent, and secure from various threats. This is where the concept of Database [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":10540,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[337],"tags":[],"class_list":["post-10539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-information-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.4.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Core Of Database Integrity - BINUS @Bekasi - Kampus Beken Asyik | Business Service and Technology<\/title>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/binus.ac.id\/bekasi\/2026\/03\/core-of-database-integrity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Core Of Database Integrity - BINUS @Bekasi - Kampus Beken Asyik | Business Service and Technology\" \/>\n<meta property=\"og:description\" content=\"Introduction In this era of digital transformation, data has become the most valuable intangible asset for an organization or company. However, simply collecting and storing data is not enough. The biggest challenge in data management is ensuring that the data remains accurate, consistent, and secure from various threats. This is where the concept of Database [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/binus.ac.id\/bekasi\/2026\/03\/core-of-database-integrity\/\" \/>\n<meta property=\"og:site_name\" content=\"BINUS @Bekasi - Kampus Beken Asyik | Business Service and Technology\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-30T03:41:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T04:03:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/binus.ac.id\/bekasi\/wp-content\/uploads\/2026\/04\/Picture1-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"364\" \/>\n\t<meta property=\"og:image:height\" content=\"182\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/binus.ac.id\/bekasi\/#website\",\"url\":\"https:\/\/binus.ac.id\/bekasi\/\",\"name\":\"BINUS @Bekasi - Kampus Beken Asyik | Business Service and Technology\",\"description\":\"Binus kampus komunitas kreatif Bekasi dengan visi membangun universitas yang berkelas dunia di tahun 2020 mendatang, sebagai langkah menuju visi tersebut, BINA NUSANTARA kampus komunitas kreatif mengambil suatu langkah mantap untuk membuka jaringan pendidikan di Kota Bekasi.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/binus.ac.id\/bekasi\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/binus.ac.id\/bekasi\/2026\/03\/core-of-database-integrity\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/binus.ac.id\/bekasi\/wp-content\/uploads\/2026\/04\/Picture1-1.png\",\"width\":364,\"height\":182},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/binus.ac.id\/bekasi\/2026\/03\/core-of-database-integrity\/#webpage\",\"url\":\"https:\/\/binus.ac.id\/bekasi\/2026\/03\/core-of-database-integrity\/\",\"name\":\"Core Of Database Integrity - BINUS @Bekasi - Kampus Beken Asyik | Business Service and Technology\",\"isPartOf\":{\"@id\":\"https:\/\/binus.ac.id\/bekasi\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/binus.ac.id\/bekasi\/2026\/03\/core-of-database-integrity\/#primaryimage\"},\"datePublished\":\"2026-03-30T03:41:34+00:00\",\"dateModified\":\"2026-04-01T04:03:18+00:00\",\"author\":{\"@id\":\"https:\/\/binus.ac.id\/bekasi\/#\/schema\/person\/0093f9a535f53c255093cb9273f60a88\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/binus.ac.id\/bekasi\/2026\/03\/core-of-database-integrity\/\"]}]},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/binus.ac.id\/bekasi\/#\/schema\/person\/0093f9a535f53c255093cb9273f60a88\",\"name\":\"editorarticle\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/binus.ac.id\/bekasi\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd7fa27148001ad24ed966c031d91645eee771a6f7fe3b565b46a75ad24f4df6?s=96&d=mm&r=g\",\"caption\":\"editorarticle\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/binus.ac.id\/bekasi\/wp-json\/wp\/v2\/posts\/10539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/binus.ac.id\/bekasi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/binus.ac.id\/bekasi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/binus.ac.id\/bekasi\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/binus.ac.id\/bekasi\/wp-json\/wp\/v2\/comments?post=10539"}],"version-history":[{"count":1,"href":"https:\/\/binus.ac.id\/bekasi\/wp-json\/wp\/v2\/posts\/10539\/revisions"}],"predecessor-version":[{"id":10541,"href":"https:\/\/binus.ac.id\/bekasi\/wp-json\/wp\/v2\/posts\/10539\/revisions\/10541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/binus.ac.id\/bekasi\/wp-json\/wp\/v2\/media\/10540"}],"wp:attachment":[{"href":"https:\/\/binus.ac.id\/bekasi\/wp-json\/wp\/v2\/media?parent=10539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/binus.ac.id\/bekasi\/wp-json\/wp\/v2\/categories?post=10539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/binus.ac.id\/bekasi\/wp-json\/wp\/v2\/tags?post=10539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}