A cybersecurity analyst is reviewing the code of a legacy web application and discovers a function handling user input without proper size checks, which can potentially allow more data than anticipated. What type of control should the analyst recommend to mitigate the risk associated with this vulnerability?
Implement input validation to enforce proper input size and content.
Enforce stricter password complexity requirements for user accounts.
Increase the size of the buffer to accommodate more data.
Upgrade the cryptographic algorithms used by the application.