2.5 Additional Information for Security Types