Watch this video on YouTube
How does the risk of improper file access change after the implementation of a database system?