Both dangers and vulnerabilities need to be considered simultaneously. Dangers can give harm to the confidentiality, accessibility and uprightness of information present in the data frameworks. They investigate opportunities for security breaches to cause classified information intrusion by means of unapproved access, amendment of information, removal of data from data frameworks.
Threats can hit the pharmacy system from different sources. These threats are confidential on the parameters of distinctive capacities and methodology including outer approaches by cyber-crimes, hackers, terrorists. For taking care of dangers of diverse nature for the pharmacy, distinctive risk alleviation and control techniques are needed in the connection of securing the organized information systems. Vulnerabilities are the shortcomings which are exhibited in the framework against the current dangers. Vulnerabilities can be recognized as security loop holes in the framework. If hackers discover these loop holes in the framework, results are wrecking including unauthorized access, revision or complete cancellation of the framework. A recent example is the hacking of wiki leaks site which affected the entire world furthermore influenced strategic and financial relations between nations as different classified documents were spilled out from the site. Vulnerabilities are fruitful because of approach shortcomings, deficient usage of security framework, and information of individual issues. For recognizing any conceivable threats, testing of the security framework including system parts, hardware and software is essential which may happen later on. The risk is characterized as the probability of diverse dangers by means of distinctive circumstances, which are influencing the system and data frameworks. The circumstances ought to consider the system,