Consider a scenario in which an attacker is interested in breaking into Windows NT or Unix shell accounts. What is the best way to prevent unauthorized access to these accounts?
1) Use strong and unique passwords for each account
2) Regularly update the operating system and software
3) Implement two-factor authentication
4) Monitor and analyze system logs for suspicious activity