A cyber security analyst is tasked with implementing a control to mitigate a recently discovered buffer overflow vulnerability within a critical application. Which of the following is the BEST control to implement in order to directly address the vulnerability?
Increasing the size of buffers within the application to accommodate larger amounts of data.
Input validation to control the amount and type of data accepted by the application.
Creating backups of application data to ensure it can be restored in the event of data corruption.
Installing a web application firewall (WAF) to monitor incoming traffic and block potential attacks.