Share three cyber security best practices that could be applied to the US government/military. For each, explain what it is, why it should be used, and its application (not expected to implement but be able to explain). I will understand if you include in this answer the best practice(s) that you have noted in question 1. But also try to look at from the unique angle of the US government as its needs could be unique. Number the best practices as i, ii, iii, etc. so that I can clearly identify them.