9
Computer software for testing vulnerability in computers, computer systems and computer networks, identifying and assessing security risks; computer software for threat and risk-management assessments, analysis, and investigations; computer software for scanning and monitoring computer network connections for signs of unauthorized entry, intrusion detection and prevention and management; computer software for creating, monitoring and maintaining firewalls; computer software for monitoring and collecting computer system and computer network data; computer software for scanning computer operating systems, computer networks and computer data storage devices for computer viruses and other malware; computer software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses; computer software for encryption and decryption; computer software for testing vulnerability in computers; computer software for monitoring and collecting computer systems and network data; security software; cloud computing software; application software for cloud computing services; computer hardware; online electronic publications (downloadable); online electronic publications (downloadable) for education, training and tuition; downloadable computer software for testing vulnerability in computers, computer systems and computer networks, identifying and assessing security risks; downloadable computer software for threat and risk-management assessments, analysis, and investigations; downloadable computer software for scanning and monitoring computer network connections for signs of unauthorized entry, intrusion detection and prevention and management; downloadable computer software for creating, monitoring and maintaining firewalls; downloadable computer software for monitoring and collecting computer system and computer network data; downloadable computer software for scanning computer operating systems, computer networks and computer data storage devices for computer viruses and other malware; downloadable computer software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses; downloadable computer software for testing vulnerability in computers
41
Education, training and tuition services in the field of computing and network security; education, training and tuition service in the field of cyber security and computer security; education, training and tuition services in the field of information technology, information technology and internet security; providing online electronic publications (not downloadable); providing online electronic publications (not downloadable) for education, training and tuition; publication of books and texts (other than publicity texts) for education, training and tuition; arranging and conducting seminars, symposiums and workshops in the field of cyber security, computer security, information technology and information technology and internet security; advisory, information and consultancy services in relation to the aforesaid services; all the aforesaid services also provided online, via the Internet, via a website, or via a communications network
42
Research, development, design, implementation and testing services in the fields of computer, computer system and computer network security including software verification and validation testing; technical data analysis; testing, technological analysis and consulting services in the field of security, access, authorisation, and identification systems for users of computers, computer systems and computer networks; testing services for computer, data and cyber security; provision of computer security risk management and mitigation programs; provision of expert appraisals and professional consultancy relating to computer security; recovery of computer data; remote computer backup services; security services for computer networks, computer access and computerised transactions; providing non-downloadable software for testing vulnerability in computers, computer systems and computer networks, identifying and assessing security risks; providing temporary use of online non-downloadable computer software for threat and risk management assessments, analysis, and investigations; providing temporary use of online non-downloadable computer software for scanning and monitoring computer network connections for signs of unauthorized entry, intrusion detection and prevention and management; providing non-downloadable software for creating, monitoring and maintaining firewalls; providing non-downloadable software for monitoring and collecting computer systems and network data; providing non-downloadable software for scanning computer operating systems, computer networks and computer data storage devices for computer viruses and other malware; providing non-downloadable software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses; providing non-downloadable software for encryption and decryption; cloud computing services for developing and implementing computer networks and computer systems; cloud computing services for computer data, computer network and computer system security, cybersecurity, user testing and validation; software as a service (SaaS) for developing and implementing computer networks and computer systems; software as a service (SaaS) for computer data, computer network and computer system security, cybersecurity, user testing and validation, cybersecurity, user testing and validation; services in providing technical advice, support and assistance in the field of computer security and cyber security; analysis relating to computer software, computer systems and networks; computer, computer system and computer network security protection services; computer consultancy relating to IT security; cybersecurity services including collecting, aggregating and technical analysis of cybersecurity threat data and information intelligence; cybersecurity services including generating and delivery of threat reports; services in monitoring and protecting computer networks, providing cyber security and information security diligence and solutions; computer security consultancy; providing temporary use of online non-downloadable computer software testing to identify security vulnerability; computer forensic services; computer security consulting services in the field of maintaining the security and integrity of databases; computer network security services and communications network security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis; computer and network incident response and forensics and penetration testing; computer disaster recovery planning; computer forensics; computer security services; computer security software development and maintenance; computer security system monitoring services; computer security threat analysis for protecting data; computer services, namely, providing technical information and design of databases for the security of data, monitoring the privacy and confidentiality of data on a website, and evaluating website security; technological consulting services in the fields of computer security and cyber-security, computer and cyber-threat assessment and remediation; computer, data and cyber security consultation and quality accreditation services; computer, data and cyber security services; software development and maintenance; design and development of security software for cloud computing networks; design, development, implementation, testing, analysis and consultancy relating to IT security solutions; internet security consultancy; information technology security services including testing to assess security controls, protection and recovery of computer data; maintenance and updating of computer software relating to computer, data and cyber security and prevention of risks; advisory, consultancy and information services in relation to all the aforesaid; all the aforesaid services also provided online, via the Internet, via a website, or via a communications network
45
Digital, computer and cyber security consulting services; software and data security consulting services; internet security consulting services; identity verification services; regulatory compliance auditing services; response and mitigation of data and network security incidents; security inspection and risk assessment; security monitoring services; security services for the protection of intellectual and industrial property; surveillance and security services relating to computers, computer systems and computer networks; consulting services in the field of security threat assessment, namely, consulting services intended to identify, pursue, and deter threat actors; advisory and information services in relation to the aforesaid services; all the aforesaid services also provided online, via the Internet, via a website, or via a communications network