The progress of information technology and computing have made our life in recent years is becoming easier, enabling us to communicate from miles away in seconds and make many discoveries that, because it had been possible, with tools very important today. But nothing is perfect, also has its disadvantages, and that today's world is highly dependent on these tools, and this be so, it is easy for people with bad intentions try, doing tricks and cause damage to systems that practically " stop the world ", these characters are crackers, often confused with hackers and computers damaged by codes that alter the workings of computers, which are viruses which, according to various characteristics are divided into many classes more, leaving the world very concerned about the damage they can do (Gordon, 2003).
But the world has not stood idly by as engineers, programmers and many people linked to the issue have put their knowledge by creating Antivirus, Firewalls, as well as laws against computer crimes to minimize the damage from viruses while giving a lesson for having fun or viruses used for profit.
This report will attempt to cover a new topic in more detail, discussing the definitions of viruses, Antivirus, Firewall, Hackers and Crackers with their definitions and differences Antivirus software market and their codes of ethics, both for engineers and sellers software. Work taken from the point of view of people intending to inquire about the subject and to inform more people of a simpler way, covering all the points that an individual user level should know, looking for information on the Net: Internet, trying to find the coincidence of the views of certain pages and review the differences in their writings, concluding that, in our thinking, is the most closely related to the subject, reaching all possible views reach a common view.
Security in Computer Systems
When we do some work using computational means always need the right software and the high costs often have comparable even with the hardware (if we buy original programs) therefore need to take security measures to keep the software in good condition and away from attacks by viruses and hackers. This can be seen from the point of view but for a larger company that security is essential because the integrity, confidentiality and availability of data would be vital to a company that relies on a computer system. Security types are divided into Physical property damage (breakdowns, power failures, fire, theft, etc) and logical data control to reduce the risk of transfer, modification, loss or disclosure of data (Bosworth, 2002). The creation of a security program must contain at least the following measures:
Classification of staff, system access control, protection systems user access (password) protection systems timeout in the terminal, file encryption, access time restriction, intrusion detection and expulsion, assignment properties, methods of support, virus control, Software Quality Control, Monitoring and auditing systems.
To ensure the permanence of the information must have: A system disk, at least an Antivirus program updated ...