42 Scientific consultation and technological consulting services and research and design relating thereto in the field of cyber security and privacy, namely, key and certificate generation device authentication password management and data privacy; industrial analysis and research services, namely, analysis and research services in key and certificate generation, device and user authentication, password management and data privacy, in the field of cyber security and privacy; design and development of computer hardware and software in the field of cyber security and privacy; design and development of new technology for others in the field of cyber security and privacy; research in the field of data processing technology in the field of cyber security and privacy; application service provider, namely, hosting, managing, developing, analyzing and maintaining applications, software and websites of others in the fields of cyber security and privacy; computer virus protection services; computer programming services for electronic data security for others; computer security services for protection against illegal network access, also known as computer security services, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities; computer security services in the nature of administering digital certificates; computer security system monitoring services; computer security threat analysis for protecting data; consultancy in the field of security software; data security services, namely, design, development and management of electronic data security systems in the fields of key and certificate generation, device and user authentication, password management and data privacy; data security services in the nature of providing online non-downloadable fire walls; design and development of internet security computer programmes for others; programming of internet security programs for others; provision of security services for computer networks, computer access and computerized transactions, namely, the provision of consultation and advice in relation to the use, implementation and installation of computer software for key and certificate generation, device and user authentication, password management and data privacy; rental of internet security computer programs; research in the field of cyber security; updating of computer software relating to computer security and prevention of computer risks; design and development of wireless computer networks in the field of cyber security and privacy; cloud seeding; computer services, namely, cloud hosting provider services; providing virtual computer systems and virtual computer environments through cloud computing; computer security consultancy; computer system analysis; electronic data storage; offsite data backup; research and development of new products for others in the field of cyber security and privacy; server hosting; design and development of electronic data security systems; computer security services, namely enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on the signed credentials; technical support, namely, monitoring technological functions of computer network systems; providing technology information updates for home cyber security systems via the global computer network; research in the field of intelligence and security technology; development of software for secure network operations; computer security services, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities; maintenance of computer software relating to computer security and prevention of computer risks; computer security services, namely, the monitoring and analysis of network traffic for the use in the detection and prevention of cyber threats; technical support services, namely, 24/7 monitoring of network systems, services and web and database applications and notification of related events and alerts; platform as a service (PAAS) featuring non downloadable software platforms for use in the monitoring and analysis of network traffic, and detection and prevention of cyber threats; software as a service (SAAS) services featuring non-downloadable software for use in the monitoring and analysis of network traffic, and detection and prevention of cyber threats; consulting services in the field of software as a service (SAAS); application service provider (ASP) featuring non-downloadable software for use in monitoring and controlling home networks security and privacy; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorised data and programs on computers and electronic devices; monitoring of computer security services for protecting data and information from unauthorised access; consulting services in the field of maintaining the security and integrity of databases; advisory services in the field of home network security systems; computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point and sale activity indicating theft, fraud, or other criminal activity for protecting data and information from unauthorized access; information, advisory and consultancy services relating to all the aforesaid services