When dealing with security threats and using the cyber kill chain model, which two approaches can an organization use to block a potential back door creation? 1) Implementing strong access controls 2) Regularly updating software and patches 3) Using encryption techniques 4) Conducting regular security audits