42 Information technology (IT) security and protection services in the nature of computer security services, namely, restricting unauthorized access to hard drives, computer networks, and websites; Information technology (IT) restoration services in the nature of computer services, namely, data recovery services; Managed information technology (IT) security services in the nature of computer security services, namely, restricting unauthorized access to hard drives, computer networks, and websites; Design and development of computer software; Testing and risk assessment of information technology (IT) security systems, online security systems, electronic mail security systems, network security systems, data security systems, and computer security systems; computer security services for protection against illegal network access and analysis for protecting data; computer security services for protecting data and information from unauthorized access, namely, computer security system monitoring services; design and development of internet and electronic data security systems and programs; computer security consultancy featuring the provision of computer security risk management programs; updating of computer software relating to computer security and prevention of computer risks; Testing of information technology (IT) security systems, online security systems, electronic mail security systems, network, data security systems and computer security systems for compliance with regulatory requirements; penetration testing of computer systems, computer networks, electronic data and websites to assess information security vulnerability; Software as a service (SAAS) services featuring software for use in the field of cybersecurity; Platform as a service (PAAS) featuring computer software platforms for use in the field of cybersecurity; information, advisory and consultancy services in relation to all the aforesaid services