Ø Redundancy is controlled.
Ø Unauthorized access is restricted.
Ø Providing multiple user interfaces.
Ø Enforcing integrity constraints.
Ø Providing backup and recovery.