https://moodle.cs.ubbcluj.ro/pluginfile.php/50142/mod_resource/content/1/DBMSs_Lecture6.pdf
protecting the data against unauthorized users (who may want to read, modify, destroy the data)
i.e. users have the right to do what they are trying to do
specified in a declarative language
saved in the system catalog
e.g. primary key constraint, specified in SQL and saved in the system catalog
(retrieving info about PK constraints in SQL Server: SELECT * FROM sys.objects WHERE type = 'PK')
the system monitors users' actions to enforce the specified constraints e.g. INSERT, UPDATE statements cannot violate a PK constraint