DESIGN AND IMPLEMENTATION OF ACCESS CONTROL, ENCRYPTION, FIREWALL, SECURE ELECTRONIC COMMERCE AND VIRUS PROTECTION SOFTWARE SYSTEMS
Computer and ScientificMONITORING COMPUTER SYSTEMS OF OTHERS FOR SECURITY PURPOSES AND COMPUTER SECURITY MANAGEMENT SERVICES, NAMELY PROVIDING PROTECTION AND SECURITY FOR ELECTRONIC INFORMATION BY PROVIDING INTERNAL AND EXTERNAL SECURITY ASSESSMENTS, DIGITAL CERTIFICATES, SECURING WEB SITES VIA SECURED SOCKETS LAYER TECHNOLOGY, VIRTUAL PRIVATE NETWORKS AND OTHER REMOTE ACCESS TECHNOLOGIES, INTRUSION DETECTION AND INTERNAL AND EXTERNAL PENETRATION TESTS
Personal