Abstract
Abstract
Additive manufacturing (AM) security is considered an integral part of several broader security fields, including supply chain security and critical infrastructure security. This article presents a general guide to the types of data and locations of data as they may exist in a typical AM-using organization. It discusses the following threat categories: technical data theft, sabotage, illegal part manufacturing, and data infiltration and exfiltration. The article also presents a detailed discussion on countermeasures against threat categories.