42 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of Securing Data; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to Data; Computer security services, namely, restricting unauthorized network access by Hardware; Computer security services, namely, restricting unauthorized network access by Software; Computer security threat analysis for protecting data; Data security consultancy; Design and development of electronic data security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Internet security consultancy; Maintenance of computer software relating to computer security and prevention of computer risks; Providing user authentication services using biometric hardware and software technology for protecting access to data; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks