42 design and development of computer software and online computer software systems; Computer security services, namely, restricting unauthorized access to computer software and computer systems; data encryption, decryption and authentication of online information and messages; security services, namely, scanning and testing of computers, networks and mobile electronic devices to assess information security vulnerability; computer services, namely, providing computer security information regarding risks and vulnerabilities for computer systems, and networks