In order to properly define the different vulnerabilities that can affect a Big Data ecosystem consider
the NIST Vulnerability and CVE database which contains a huge repository. Also, there are different techniques that
ease the discovery of threats like attack trees, misuse cases, or misuse activities.
Reference:
• E. B. Fernandez, Security patterns in practice: designing secure architectures using software
patterns. John Wiley & Sons, 2013.
|