42 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; data security services, namely, backup, remote upgrade and remote disabling of sensitive data; computer security services, namely, restricting unauthorized access to computer networks and hard drives