How can triggers method match the description of protecting databases