Handshaking
Explain
​
Another security feature which is used in order to keep systems and data secure is handshaking. Handshaking is a term used to describe the action of establishing a connection between two users on a network. Once a connection has been established, the users must be verified and the handshake does this. It verifies the connection, speed and verifies the authentication of the computer and user. In order to do this it uses the CHAP Protocol which stands for Challenge Handshaking Authentication Protocol. CHAP works by sending a message to the server after the connection has been made, to the requestor. They will then reply using a hash function. After this, the server will check the response and compare it to the original hash value. If the hash values match then the connection with is authenticated, and if not then the connection is ended. This keeps both systems and data secure because it makes sure that the connection should be happening, and that nobody is interfering with the connection.
Example
​
Relating this back to my case study, Vodafone would use this authentication process of handshaking when two PC’s in the company are talking to each other and communicating over the network. The CHAP protocol would make sure that both computers want to communicate by handshaking through the network server. This will authenticate each user so that they can show they are real, and then continue to communicate. CHAP establishes the rules and parameters for the two PC’s.
