Redundancy
Inconsistency
Isolation
Atomicity
Concurrent Access Anomalies
Difficulty in accessing Data Security
Last updated 2 years ago