Date First Published: 19th January 2024
Topic: Cybersecurity
Topic: Security Mechanisms & Technologies
Difficulty: EasyDifficulty Level: 3/10
Learn about what a login is in this article.
A login is a set of credentials that enables access to an electronic account or system. The user credentials are usually a username or password, but may also consist of a PIN, biometric authentication, or passcode, which modern systems require as a second factor for extra security. Logins make user accounts possible and are a security mechanism designed to protect against unauthorised access to confidential data.
At first, a login screen is displayed, which often contains a username and password field. Once the correct username and password are entered, the user may be successfully logged in or may have to go through an extra security check, such as a one-time code sent as a text message, to log in. When a login fails, access will be denied. To protect against brute-force attacks, most systems lock users out after multiple failed login attempts.
Once the user is logged in, the login token is used to track what actions the user has taken whilst logged in. Websites often use cookies to track sessions, so when the access is no longer needed, the user can log out and the session cookies will be deleted from the user's computer. A login page may also have a dynamic URL parameter, which specifies where to redirect back after logging in or out.
For extra security, users may be automatically logged out after a certain period of inactivity. To log back in, users will be required to re-enter their credentials. However, users should not rely on automatic ways of logging out of a system, especially not on a public computer. Instead, users should manually log out and wait for the confirmation that this request has taken place.
Examples of logins include:
The term "login" is commonly miswritten. When used as a noun that refers to authentication credentials to access a user account, it is spelt "login" (e.g. the information you use to sign in to your email is your login). When used as a verb, it is spelt "log in" (e.g. you can log in with your username and password).
The term "login" was introduced with the time-sharing systems of the 1960s and Bulletin Board Systems (BBS) in the 1970s. Early home computers and PCs did not generally require them until Windows NT, OS/2 and Linux in the 1990s.
The noun "login" comes from the verb (to) log in and with the verb to clock in. Computer systems keep a log of users' access to the system. The term "log" comes from the chip log historically used to record distance travelled at sea and was recorded in a ship's log or logbook. To sign in indicates the same idea but is based on the idea of manually signing a log book or visitor's book.
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection