Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

ITL Bulletin

Is Your Replication Device Making An Extra Copy For Someone Else?

Date Published: April 2015

Author(s)

Celia Paulsen (NIST), Larry Feldman (G2), Gregory Witte (G2)

Abstract

Keywords

3D printers; 3D scanners; copiers; countermeasures; exploits; mitigation; multifunction devices; printers; replication devices; risk; risk assessment; risk management; scanners; security controls; threats; vulnerabilities
Control Families

Access Control; Audit and Accountability; Configuration Management; Identification and Authentication; Maintenance; Physical and Environmental Protection; Planning; Risk Assessment; System and Services Acquisition;