Explain the three key areas to address in the IT security risk specific to the US government/military organization and how to address them using any policy and/or tools and/or technology.  Number each component as i, ii, ii so that I can clearly identify them.