1目录一、业务安全蓝军测评标准..............................................................................................................61.1业务安全脆弱性评分(ISVS).............................................................................................61.2ISVS评分的参考意义.......................................................................................................8二、业务安全蓝军测评案例...................................................................................................132.1虚假安装蓝军测评案例..................................................................................................132.2人脸识别绕过蓝军测评案例..........................................................................................15三、业务安全蓝军测评类型...................................................................................................203.1基础测评...........................................................................................................................203.2周期测评...........................................................................................................................213.3行业横评...........................................................................................................................21四、业务安全蓝军测评场景.......................
发表评论取消回复