International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Issue 07, Volume 5 (July 2018) www.irjcs.com __________________________________________________________________________________________________ IRJCS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.281 Indexcopernicus: (ICV 2016): 88.80 © 2014- 18, IRJCS- All Rights Reserved Page -406 THREE STEP VERIFICATION SYSTEMS USING EXTREMELY PROTECTED BY SOCIAL NETWORKING K. Muthu Meena, Research Scholar in Department of Computer Science, Noorul Islam Centre for Higher Education, Kumaracoil, Kanyakumari Dt, Tamilnadu, India meenajeeva88@gmail.com Dr. J.R.Jeba., Associate Professor, Department of Computer Applications, Noorul Islam Centre for Higher Education, Kumaracoil Kanyakumari Dt, Tamilnadu, India jrjeba@rediffmail.com Manuscript History Number: IRJCS/RS/Vol.05/Issue07/JYCS10088 Received: 14, July 2018 Final Correction: 19, July 2018 Final Accepted: 27, July 2018 Published: July 2018 Citation: Meena & Jeba (2018). THREE STEP VERIFICATION SYSTEMS USING EXTREMELY PROTECTED BY SOCIAL NETWORKING. IRJCS:: International Research Journal of Computer Science, Volume V, 406-417. doi://10.26562/IRJCS.2018.JYCS10088 Editor: Dr.A.Arul L.S, Chief Editor, IRJCS, AM Publications, India Copyright: ©2018 This is an open access article distributed under the terms of the Creative Commons Attribution License, Which Permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited Abstract - In today's world, social media play an incredibly large role in the way the world exists in general. In this analysis introduce secure breached Social Networking security and hacked accounts to be protected. In the social networking site user want to reset or forgot their password on his social network account to using three Step Verification Systems using extremely protected. The first step secure using dialer secret password (color based click count) method and second step Password by own picture is a new graphical password system for social networking that restore the personal images typically used in graphical password systems with personalized sign. The proposed secure system used with personal pictures displayed end user device such as a mobile or desktop. The third one is to Authenticating users with the help of their friends (i.e., trustee-based social authentication) has been show into be a promising backup authentication mechanism. In this new social network security trustees that were chosen from the user’s friends. The user wants to get back access to the account the social network provider sends different verification codes to the user’s trustees. The user must obtain at least verification codes from the trustees before being directed to reset his or her password. Keywords – Three step secure; trustee-based; forgot password; graphical password; I. INTRODUCTION Social media is a website where people develop virtual social networks; share their interests, activities, backgrounds or people that know each other from the real life. A person can create their own accounts and connect with their friends in their account. These networks also allow users to find new friends, creating groups & pages and develop their friend circles. Sharing is another important feature by which users are able to share photos, videos, activities, interests, and many more items what they like. Users can up-to-date their information by visiting social media, interact with others through chatting, comments etc. They can surf other members profile and know others quickly. This project is used to develop a technique based on three step verification systems using extremely protected by social networking. These days high measure of day by day collaboration with informal communities, make them compelling piece of the client's life.