Logging (computer security)
Encyclopedia
In computer security
Computer security
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

, a login or logon (also called logging in or on and signing in or on) is the process by which individual access
Access control
Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system...

 to a computer system is controlled by identifying
Identification
Identification or Identify may refer to:* Body identification* Combat Identification* Eyewitness identification* Forensic identification* Gender identity* Hazard Identification...

 and authentifying
Authentication
Authentication is the act of confirming the truth of an attribute of a datum or entity...

 the user
User (computing)
A user is an agent, either a human agent or software agent, who uses a computer or network service. A user often has a user account and is identified by a username , screen name , nickname , or handle, which is derived from the identical Citizen's Band radio term.Users are...

 referring to credential
Credential
A credential is an attestation of qualification, competence, or authority issued to an individual by a third party with a relevant or de facto authority or assumed competence to do so....

s presented by the user.

A user can log in to a system to obtain access and can then log out or log off (perform a logout / logoff) when the access is no longer needed. To log out is to close off one's access to a computer system after having previously logged in.

Procedure

Logging in is usually used to enter a specific page, which trespassers cannot see. Once the user is logged in, the login token may be used to track what actions the user has taken while connected to the site.
Logging out may be performed explicitly by the user
User (computing)
A user is an agent, either a human agent or software agent, who uses a computer or network service. A user often has a user account and is identified by a username , screen name , nickname , or handle, which is derived from the identical Citizen's Band radio term.Users are...

 taking some action, such as entering the appropriate command
Command (computing)
In computing, a command is a directive to a computer program acting as an interpreter of some kind, in order to perform a specific task. Most commonly a command is a directive to some kind of command line interface, such as a shell....

, or clicking a website
Website
A website, also written as Web site, web site, or simply site, is a collection of related web pages containing images, videos or other digital assets. A website is hosted on at least one web server, accessible via a network such as the Internet or a private local area network through an Internet...

 link labeled as such. It can also be done implicitly, such as by the user powering off his or her workstation, closing a web browser
Web browser
A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier and may be a web page, image, video, or other piece of content...

 window, leaving a website, or not refreshing a webpage within a defined period.

In the case of web sites that use cookies
HTTP cookie
A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to a user's browser and for the browser to return the state information to the origin site...

 to track sessions, when the user logs out, session-only cookies
HTTP cookie
A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to a user's browser and for the browser to return the state information to the origin site...

 from that site will usually be deleted from the user's computer. In addition, the server invalidates any associations with the session, making any session-handle in the user's cookie
HTTP cookie
A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to a user's browser and for the browser to return the state information to the origin site...

 store useless. This feature comes in handy if the user is using a public computer
Public computer
A public computer is any of various computers available in public areas. Some places where public computers may be available are libraries, schools, or facilities run by government....

 or a computer that is using a public wireless connection. As a security precaution, one should not rely on implicit means of logging out of a system, especially not on a public computer, instead one should explicitly log out and wait for the confirmation that this request has taken place.

Logging out of a computer when leaving it is a common security practice, preventing unauthorized users from tampering with it. There are also people who choose to have a password-protected screensaver
Screensaver
A screensaver is a type of computer program initially designed to prevent phosphor burn-in on CRT and plasma computer monitors by blanking the screen or filling it with moving images or patterns when the computer is not in use...

 set to activate after some period of inactivity, requiring the user to reenter their login credentials to unlock the screensaver and gain access to the system. There can be different methods of logging in that may be via image, finger prints,eye scan, password(oral or textual input) etc.

Spelling confusion

The verbs are two words: log in and log out, whereas the nouns are login and logout (often used like adjectives in compound nouns).

Etymology

The noun login comes from the verb (to) log in, which was formed by analogy with the verb to clock in. The expressions may also have a more literal origin — computer systems tend to keep a record, called a log, of users' access to the system; hence, to log in is to prompt an entry into the system's log by accessing the system. Signing in connotes the same idea, in that providing the credential that authenticates a user's right to entry is akin to a signature.

The terms began to enter common usage among computer user
Computer User
Computer User is a computer magazine originally founded in 1982, and which, after several owners and fundamental changes, is still in business today online as computeruser.com...

s with the origin of the computer Bulletin Board System
Bulletin board system
A Bulletin Board System, or BBS, is a computer system running software that allows users to connect and log in to the system using a terminal program. Once logged in, a user can perform functions such as uploading and downloading software and data, reading news and bulletins, and exchanging...

 (BBS) in the 1970s.

See also

  • Access code
    Access Code
    Access code may refer to:In authentication:* Password, a secret word.* Personal identification number , a secret numeric code.In telecommunications:* National access code, used to dial a domestic call....

  • Account
    User (computing)
    A user is an agent, either a human agent or software agent, who uses a computer or network service. A user often has a user account and is identified by a username , screen name , nickname , or handle, which is derived from the identical Citizen's Band radio term.Users are...

  • Computer security
    Computer security
    Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

  • Login session
    Login session
    In computing, a login session is the period of activity between a user logging in and logging out of a system.On Unix and Unix-like operating systems, a login session takes one of two main forms:...

  • Login spoofing
    Login spoofing
    Login spoofings are techniques used to steal a user's password. The user is presented with an ordinary looking login prompt for username and password, which is actually a malicious program, usually called a Trojan horse under the control of the attacker...

  • OpenID
    OpenID
    OpenID is an open standard that describes how users can be authenticated in a decentralized manner, eliminating the need for services to provide their own ad hoc systems and allowing users to consolidate their digital identities...

  • Password
    Password
    A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource . The password should be kept secret from those not allowed access....

  • Password policy
    Password policy
    A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part of security awareness training...

  • /var/log/wtmp
    Utmp
    utmp, wtmp, btmp and variants such as utmpx, wtmpx and btmpx are files on Unix-like systems that keeps track of all logins and logouts to the system....

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK