Encryption data will be consumed for physical security utilizing important cryptographic module and can be utilized at multitude level in the company. There are some fences in the controlling and prosecuting criminals and the main barrier is that crimes are outdoor of the legal authority of the topographical zone of certain court and therefore it will be complex to effectively and efficiently prosecute according to the usual legislation. Access points are dissimilar edge threat modeling where intruders will consume the cross point through the healthcare system to obtain unauthorized privileges to assets. Threats are regularly existed when weak points in strategy, possibility and configuration for apprehension to every person who are consuming information management system for their operations (Kogias et al., 2017). Cipher text only attack will deliberate the encryption key and the attacker will gain access to the cypher text. Encryption key might be deliberated by cipher text only attack. The hypothesis will seek to facilitate a suitable understanding of threats and their motivation, capabilities, and qualities discovering from various intruders such as companies and intelligence. When the application of preventive measures is simple and low cost when contrasted to the risk of allowing break-ins to occur later it is important to function on the preventive measures and apply them.The security system operation is to secure the dependability of an operational system by applying a security policy is called as security model. In diversity technique, imitation of expected signal isaccessible and these same replications of signal can face sovereign fading (Yang et al., 2018). A Firewall of web application will be improved in its execution by consuming penetration testing of security of web application.Cyber fears are excessive and cyber-attacks on essential influences of national infrastructure are not distributed. Auditing policies are required to be validated to endure that the whole thing is functioning as forecasted and this will be the suitable method for compliance audit. References Kogias, I., Xiang, Y., He, Q., &Adesso, G. (2017). Unconditional security of entanglement-based continuous-variable quantum secret sharing. Physical Review A, 95(1), 1. Yang, A., Li, Y., Kong, F., Wang, G., & Chen, E. (2018). Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things. IEEE Access, 6(1), 50187-50196.