How is the risk of improper file access affected upon implementing a database system?