IJSRST173747 | Received : 10 Sep 2017 | Accepted : 19 Sep 2017 | September-October-2017 [(3) 7: 182-198] © 2017 IJSRST | Volume 3 | Issue 7 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X Themed Section: Science and Technology 182 Major Web Application Threats for Data Privacy & Security Detection, Analysis and Mitigation Strategies Varun M Deshpande *1 , Dr. Mydhili K. Nair 2 , Dhrumil Shah 3 * 1 PhD Student, Department of C.S.E., Jain University, Bangalore, India 2 Professor, Department. of I.S.E., M S Ramaiah Institute of Technology, Bangalore, India 3 Application Security Specialist, Bangalore, India ABSTRACT In the context of information security, privacy and data security are inseparable, interdependent and complement each other. This is truer in social networking and e-commerce where user‟s personal data including financial transaction data is at stake. Web application security threats have posed several challenges to ensuring data security of any web application hosted on cloud. These threats have been evolving in severity and the potential impact that it causes to service provider and the user‟s personal data that it hosts. Current work is an effort to educate the readers about major vulnerabilities that exist among security threats listed as part of Open Web Application Security Project‟s (OWASP) top ten web security threats. We provide detailed guidelines on how to detect, and analyse these vulnerabilities using tools such as Burp Suite. Recommendations and best practices for developing a secure development life cycle and following secure coding practices are discussed at length to empower developers to mitigate and avoid these vulnerabilities in their application at different stages of software development. This work is a timely and technically informative reminder for all the service providers to build trustable solutions for secure cloud based services and move towards trusted computing and to ensure user data‟s privacy and security. Keywords: Privacy, data security, digital identity, OWASP, web application threats I. INTRODUCTION A. Privacy and Security Complementary concepts In the world of information security, terms privacy and security are often used on behalf of each other. Although it is technically not the same, they are hugely inter- dependent and form 2 faces of the coin named information security”. To illustrate this thought, let us consider a service provider which hosts large amounts of its consumer‟s personally identifiable information, such as financial transaction records and other personal information which is ought to be kept in private and in reasonable safety. Suppose, an external malicious agent can hack into the service provider‟s servers and able to gain access to all these user data records. He can then use it for gaining unfair financial benefit or even cause harm to the users and the service provider. Private user information which had to be secured, is now an asset of the hacker. Hence, data security is the door keeper of the fortress of data privacy. If the service provider‟s data security is breached, the private information which is stored in the server is vulnerable to data theft and loss of privacy. Loss of privacy due to data security breach has happened several times in recent past as highlighted by Varun M Deshpande et al. [6]. Yahoo (2016) announced that about 500 million of its user records were compromised. About 360 million records from MySpace (2016) was hacked by hackers. One concern with soft data is that, even after data is stolen, the data still exits on the hard drive making it extremely difficult to proactively detect a data theft. Therefore, in some cases, the data theft is detected several months or years after the actual breach. For example, Dropbox recently discovered that about 70 million user records were compromised years ago, back in 2012. Even Linkedin reported in 2016 that it had underwent a data breach in the year 2012, when 6.5 million passwords were stolen.