0% found this document useful (0 votes)
58 views1 page

Computer Security Access Computer System Identifying Authenticating User Credentials

Logging in is the process of gaining access to a computer system by identifying oneself with a username and password. These credentials are sometimes referred to as a login. Many modern secure systems require a second factor like email or SMS confirmation in addition to a username and password for extra security.

Uploaded by

vibishnan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views1 page

Computer Security Access Computer System Identifying Authenticating User Credentials

Logging in is the process of gaining access to a computer system by identifying oneself with a username and password. These credentials are sometimes referred to as a login. Many modern secure systems require a second factor like email or SMS confirmation in addition to a username and password for extra security.

Uploaded by

vibishnan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

In computer security, logging in (or logging on, signing in, or signing on) is the process by

which an individual gains access to a computer


system by identifying and authenticating themselves. The user credentials are typically some
form of "username" and a matching "password",[1] and these credentials themselves are
sometimes referred to as a login (or a logon or a sign-in or a sign-on).[2][1] In practice, modern
secure systems often require a second factor such as email or SMS confirmation for extra
security.

Sensitivity: LNT Construction Internal Use

You might also like