35
Business consulting services in the field of cybercrime;
business risk assessment services in the fields of computer,
network, and data security and privacy; business compliance,
audit services and technical assessment in the field of
information governance and security
42
Computer consulting services in the field of computer and
computer network security; computer consulting services in
the field of critical incident response to information,
computer, network, and internet security breaches; computer
security consulting services in the field of security and
vulnerability of computers, computer systems, and computer
networks; computer security consulting services in the field
of scanning of computers and networks to assess information
security vulnerability; computer security consulting
services in the field of malware, intrusion and penetration
testing and diagnosis of computers and computer networks,
and restricting and controlling access privileges of users
of computing resources based on assigned credentials;
computer security services, namely, assessing information
technology security and vulnerability of computers and
networks; computer services, namely, providing forensic
services to recover lost and deleted data; information
technology system security remediation services, namely,
recovery of computer data; security audits, namely, computer
security consultancy in the field of scanning and
penetration testing of computer and networks to assess
information security vulnerability; information technology
restoration of systems, data, application; information
security consulting services including secure awareness
training and social engineering; web application, mobile
application and API testing and code review; dark web
investigation and analysis of sensitive data; managed cyber
security services for intranet, servers, networks and
applications providing monitoring services, intrusion
detection, active threat hunting, testing, encryption,
ransomware, and advance threat protection
45
Monitoring of computer systems for security purposes,
namely, for evidence of external criminal attacks