If a database is protected from modification using only symmetric encryption, someone may still be able to mount an attack by:
Moving blocks of data such that a field belonging to one person is assigned to another
Changing the encryption key so that a collision occurs
Using the public key instead of the private key
Arranging to intercept the public key in transit and replae it with his own