Identifying someone trying to establish a connection to a computer. During logon procedures, two
requests are made from the individual trying to gain access: a preauthorized
account (or user) name and a preset password. On a computer system used by more
than one individual, the logon procedure identifies the authorized users and
the protocols of usersÂ’ access time. These logon procedures are meant to uphold
system security by managing access to sensitive files and operations.
Access Control; Computer; Logging In.
Symantec Security Response. Glossary. [Online, July 15, 2004.] Symantec
Security Response Website.