42 Providing temporary use of online non-downloadable software for use in assessing, measuring, monitoring, tracking, detecting, preventing and managing fraud in the fields of credit fraud, credit card fraud, debit card fraud, card-not-present (CNP) fraud, contactless payments fraud, automated teller machine (ATM) fraud, retail returns fraud, merchant fraud, merchant acquiring fraud, check fraud, ACH or wire transfer fraud, electronic payments fraud, deposits fraud, person-to-person (P2P) payments fraud, new account application fraud, online banking fraud, mobile banking fraud, fraudulent mobile account access, identity theft, mortgage fraud, banking fraud; and the creation, ingestion and dissemination of shared fraud intelligence; Application service provider (ASP) featuring software for use in assessing, measuring, monitoring, tracking, detecting, preventing and managing fraud in the fields of credit fraud, credit card fraud, debit card fraud, card-not-present (CNP) fraud, contactless payments fraud, automated teller machine (ATM) fraud, retail returns fraud, merchant fraud, merchant acquiring fraud, check fraud, ACH or wire transfer fraud, electronic payments fraud, deposits fraud, person-to-person (P2P) payments fraud, new account application fraud, online banking fraud, mobile banking fraud, fraudulent mobile account access, identity theft, mortgage fraud, banking fraud; [ Providing temporary use of online non-downloadable software for use in assessing, measuring, monitoring, tracking, detecting, preventing and managing cyber security threats, attacks, or breaches or cyber security risk levels; ] creation, ingestion and dissemination of shared threat intelligence [; Application service provider (ASP) featuring software for use in for use in assessing, measuring, monitoring, tracking, detecting, preventing and managing cyber security threats, attacks, or breaches or cyber security risk; cyber security services, namely, consultation in the field of cyber security featuring the assessment, mitigation and management of cyber risk ]