You are in charge of data loss prevention at your company. You have been directed to restrict someone's access. Which of the following data loss prevention components would you be taking part of ________.
1) Data encryption
2) Access control
3) Backup and recovery
4) Intrusion detection