Where and are the only two security levels in the lattice being considered.
Lets say there is a military base that has 2 people working at different security levels.
Despite the impressive fence, the security level here was low.
She again requested information about the pair, this time at the top security level.
Other local jails are large and have many different security levels.
These are used to identify the security level for data elements in documents and web services.
End systems may know things like which files are involved, and what their security levels might be.
Either they were expecting us or the security levels around here are too high for my liking.
These often need to run at or above the security level of the browser itself.
The provisions of the other two security levels are less stringent.