Abstract
The paper is devoted to algorithm development and software tools to track changes in software and hardware of the computer. The analysis of modern approaches to the analysis of data integrity. Analyzed the advantages and disadvantages of these approaches. At the moment there are implemented the approaches related to the analysis of the integrity of the computer, but the approach we have developed an integrated manner with hardware and software integrity. To determine the degree of isolation of the computer can be used model speed control. First, check if there are any changes in the BIOS. Then, if everything is in order, it reads the boot sector of a disk or operating system drivers, which in turn also analysed for making unauthorized changes. And, finally, with the help of the operating system runs the driver call control program which ensures that the computer runs only trusted programs. Recommendations for the construction of algorithm for data integrity based on a combination of hardware and software approaches. The analysis of the configuration of the computer for all connected devices and software on the computer. Your computer configuration is copied to all connected devices at a given time to a text file, which is considered as the reference. To determine changes in the structure of the connected devices after some time repeats the sequence of actions to test devices, information is stored in text file comparisons. Consider a reference file and a file compare, conclude whether it has changed the device during the past time interval. Displays a message about adding a new device (or multiple devices) or a message indicating that the system state has not changed. The description of the software product created on the basis of the checksum algorithm and validation algorithm external devices, allowing to track changes in software and hardware of the computer. The advantage of a software product is that it comprehensively analyzes the software and hardware integrity of computer data.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright (c) 2017 International Journal of Information Technology Applications
