When dealing with security threats and using the cyber kill chain model, which two approaches can an organization use to block a potential back door creation?
1) Implementing strong access controls
2) Regularly updating software and patches
3) Using encryption techniques
4) Conducting regular security audits