Data security
To ensure quality data, data security is required. Data security could be maintained in several ways such as at the operating system level, the database level and the developed system level. If the system runs under a client server architecture in a network environment (LAN/WAN), the user must have the right to access the network which is under a workgroup, after that if s/he wants to access to the database system a database level authentication password need to be provided. Moreover access rights to entry screens for data manipulation must be maintained for the user level. As an example the data entry technician can only input the data into the system, but they never have access to modify the data. Another level user, i.e. supervisor level user can modify it.
graphic

During a database system design the system/software designer should design the system in such a way that different levels of user can access/manipulate the data file according to his/her permission.. As an example the Master data file (Ex. Individual info) must be restricted from the common user, only the administrative/super level user can access to that.
Moreover there are several ways for protecting systems and data:
Data backup: Data backup is essential, whether data is copied to other hard drives, tapes, optical disks, or even systems in other locations.
Theft protection:  Theft of equipment can cause serious downtime, even if data has been backed up, considering replacement and reconfiguration costs. You can bolt equipment to desktops and floors, lock equipment in special rooms, and hire staff to look over equipment 24 hours a day.
Protecting against fire and natural disasters:  Consider installing special fire-prevention equipment, such as halon gas systems, to reduce fire loss. To protect against natural disasters, consider what is necessary to protect the physical infrastructure. Alternative data centers may be necessary. Gasoline-powered generators can supply power to servers and workstations when electricity is cut off.
Recovery:   In the event of a physical security breach, hacker attack, fire, earthquake, or other disaster, you need to get systems back online as soon as possible.
Management style: There are advantages to both centralized management and distributed management. To centralize management, move network resources- servers, hubs, switches, routers, and other equipment-to central locations where trained staff can manage the systems in secure and protected areas. However, doing so puts you at greater risk of catastrophes such as earthquakes and fires. An alternative is to distribute network resources and automatically replicate data to remote sites on a regular basis. Use high-speed data links between the sites.
Fault tolerance: Network components should be protected against failure with techniques such as disk mirroring, disk duplexing, server duplexing, clustering, load balancing, replication, inverter power systems and a variety of other techniques, including the construction of multiple data centers
Diskless devices: Diskless workstations don't have disk drives, so users can't download valuable data or upload information in an unsupervised environment
Security:   Intruders may physically attack your system or gain access across unsecured networks.
Administration:    Network administrators need to know all the ins and outs of network operating systems and their security features to protect against attacks, mismanagement, and data corruption or loss.
Training:   Properly trained users are your best resource against security breaches, attacks, mistakes, lost data, and so on.
Tracking and auditing: Be sure logs and tracking utilities are enabled so you can track down problems after they occur.