Guideline: Definition of vulnerabilities
Relationships
Related Elements
Main Description

In order to properly define the different vulnerabilities that can affect a Big Data ecosystem consider the NIST Vulnerability and CVE database which contains a huge repository. Also, there are different techniques that ease the discovery of threats like attack trees, misuse cases, or misuse activities.

Reference:

• E. B. Fernandez, Security patterns in practice: designing secure architectures using software patterns. John Wiley & Sons, 2013.