42 Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized network access by users without credentials; Computer security services, namely, restricting unauthorized network access by managing accounts, network storage, local authentication servers, file servers, user privileges, local group policy, local software testing, restoration operations, contingency planning, and local backups for Joint Worldwide Intelligence System (JWICS), SIPRNET, NIPRNET, and other networks within the intelligence work center; Computer security services, namely, restricting unauthorized network access by verifying personnel security clearances for permanent party and visiting personnel through multiple clearance verification systems, including JPAS and Scattered Castles, managing and controlling the permanent party and visitor access badging programs for assigned facilities; Computer security services, namely, restricting unauthorized network access by conducting scheduled and unannounced security checks at access points to ensure all personnel are abiding by policies and procedures for classified equipment, packages, and information entering and exiting secure facilities; Computer security threat analysis for protecting data; Data security consultancy; Internet security consultancy