Skip to Main Content
Skip Nav Destination

Additive manufacturing (AM) security is considered an integral part of several broader security fields, including supply chain security and critical infrastructure security. This article presents a general guide to the types of data and locations of data as they may exist in a typical AM-using organization. It discusses the following threat categories: technical data theft, sabotage, illegal part manufacturing, and data infiltration and exfiltration. The article also presents a detailed discussion on countermeasures against threat categories.

You do not currently have access to this chapter.
Don't already have an account? Register
Close Modal

or Create an Account

Close Modal
Close Modal