42 Data encryption and authentication services; computer security threat analysis for protecting data; design and development of computer software and online computer software systems; Computer security services, namely, restricting unauthorized access to computer software and computer systems; Data encryption, decryption and authentication of online information, messages and data; security services, namely, scanning and testing of computers, networks and mobile electronic devices to assess information security vulnerability; computer services, namely, providing computer security information regarding risks and vulnerabilities for computer systems, data, and networks