A cybersecurity analyst discovers that a company's web application does not properly sanitize user input which could allow an attacker to execute unauthorized commands or access data. Which of the following mitigation techniques should the analyst recommend to address this specific software vulnerability?
Using parameterized queries to prevent malicious input from being executed as part of SQL commands
Employing encrypted channels for all data transmissions to the web application
Implementing role-based access control to prevent unauthorized command execution
Applying input length restrictions to limit the amount of data accepted by the web application