About
Articles by Ratan
-
Will the self-securing cloud replace security professionals ?
Will the self-securing cloud replace security professionals ?
By Ratan Jyoti
-
Why Cyber-attacks can cause next Financial Crisis?
Why Cyber-attacks can cause next Financial Crisis?
By Ratan Jyoti
Contributions
Activity
-
You might have heard people saying that individuals don’t really leave their jobs, they leave their managers. This can occur when they don’t…
You might have heard people saying that individuals don’t really leave their jobs, they leave their managers. This can occur when they don’t…
Liked by Ratan Jyoti
-
I can't even imagine what this couple must be going through right now. Their savings of a lifetime were lost because they fell victim to a malicious…
I can't even imagine what this couple must be going through right now. Their savings of a lifetime were lost because they fell victim to a malicious…
Liked by Ratan Jyoti
-
🌟 Happy to share that I have completed a certificate in Data Protection Law from the Asian School of Cyber Law! 🎓 In today's digital age…
🌟 Happy to share that I have completed a certificate in Data Protection Law from the Asian School of Cyber Law! 🎓 In today's digital age…
Liked by Ratan Jyoti
Experience & Education
Licenses & Certifications
Publications
-
Will Blockchain Replace Banks?
CPO Magzine
Blockchain is today’s most discussed technology and will remain so for more time. Crypto Society most often criticizes banks for being over-centralized and many times being overpriced and monopolistic. In contrast, Blockchain can be a viable option as it is decentralized and a cost-effective solution.
-
Will the Self-Securing Cloud Replace Security Professionals?
CPO Magazine
To expand banking business to new customers, new channels, new geography and new markets, cloud computing is an effective tool. Cloud computing is not only expandable and swift but provides competitive advantage and better customer service with significantly less infrastructure costs. Some organizations have reported that business simulations which took more than 20 hours in a physical infrastructure setup took just 20 minutes in a cloud infrastructure. This alone explains the capability of…
To expand banking business to new customers, new channels, new geography and new markets, cloud computing is an effective tool. Cloud computing is not only expandable and swift but provides competitive advantage and better customer service with significantly less infrastructure costs. Some organizations have reported that business simulations which took more than 20 hours in a physical infrastructure setup took just 20 minutes in a cloud infrastructure. This alone explains the capability of cloud-based infrastructures. However, questions have been raised about the security of such an infrastructure.
-
Are Human necessary to Cyber Threat Intelligence?
CSO Forum
Given the increasing financial and reputational costs of breaches, an organization can no longer overlook human aspect of Cyber Intelligence
-
Tackling SYN Flood attacks
Hakin9 Media
In a TCP SYN flood attack, the malicious client begins a three way handshake which the client never finishes. The client only sends TCP SYN packets and no final ACK packets, and by virtue of which the server reserves memory slots for each incomplete connection. By this process, the server’s memory gets filled with increasing incomplete connections until the server can no longer no longer accept the other incoming requests (both genuine and malicious) in want of free memory. The goal of this…
In a TCP SYN flood attack, the malicious client begins a three way handshake which the client never finishes. The client only sends TCP SYN packets and no final ACK packets, and by virtue of which the server reserves memory slots for each incomplete connection. By this process, the server’s memory gets filled with increasing incomplete connections until the server can no longer no longer accept the other incoming requests (both genuine and malicious) in want of free memory. The goal of this simple technique is to deny the TCP services to the legitimate clients by creating a large number of half open TCP connections that fill the host’s listen queue. Usually, these TCP SYN packets use counterfeit IP addresses to prevent detection and because of these nonexistent IP addresses, no responses are returned to the server.
-
Data Security and Privacy concerns for the Indian Banking Industry
http://www.cioreview.in/
The era of internet escalated banking has brought the banking channels to customer’s hand. This is possible because of communications and exchange of a very large set of data. Many of these communications involves interchange of confidential data. As the data belongs to customers, their security is the prime concerns for the banks. Privacy preservation is of also equally important as no party can be trusted enough over the public networks without checks and verification.
-
Banking in the Cloud
Efma Online
To expand banking business to new customers, new channels, new geography and new markets, cloud computing is an effective tool. However, questions have been raised about the security of such an infrastructure.
-
Wireless Sniffing through KARMETASPLOIT
Hakin9 Media
Wireless Sniffing through KARMETASPLOIT
By Ratan Jyoti
Karmetasploit is a Metasploit implementation of famous wireless sniffing tool KARMA (KARMA Attacks Radioed Machines Automatically) which passively listens to 802.11 Probe Request frames. Wireless Clients are generally targeted by creating Rogue AP and harvesting of user credentials which is carried out by exploiting client side vulnerabilities. -
Tackling Layer 7 DDoS Attacks
Hakin9
Distributed Denial of Service (DDoS) attack is a strewn challenge where the spurious or fake packets are sent to the victim in abnormally large number. DDoS attempts to block important services running on victim’s server by flooding the victim’s server with packets. The difference with DoS is that DDoS attacks do not originate from a single host or network but from multiple hosts or networks which might have already been compromised. One of the main challenges here is to find the location of…
Distributed Denial of Service (DDoS) attack is a strewn challenge where the spurious or fake packets are sent to the victim in abnormally large number. DDoS attempts to block important services running on victim’s server by flooding the victim’s server with packets. The difference with DoS is that DDoS attacks do not originate from a single host or network but from multiple hosts or networks which might have already been compromised. One of the main challenges here is to find the location of attackers and then block traffic at points near to the source of the attacks. Layer 7 DDoS attacks target the application layer at web or mail servers (eg. HTTP(S), SMTP, FTP etc) such that the service can be denied in effective way to bring web server to lock up or crash. Since they operate at the application protocol level which is OSI Layer 7 ,this attack is known as Layer 7 DDoS attack…
-
Securing The Cloud To Drive Business
Silicon India
Banking with the cloud is definitely a game changer
The burden of possessing, managing and maintaining the IT infrastructure has been the key challenge for financial sector. Banking with the cloud has definitely been a game changer. Many banks have already placed their less critical application to cloud computing as a low-risk exercise. The major benefits to the bank are:
• No upfront capital costs and reduced technology costs
• Faster implementation • High flexibility and…Banking with the cloud is definitely a game changer
The burden of possessing, managing and maintaining the IT infrastructure has been the key challenge for financial sector. Banking with the cloud has definitely been a game changer. Many banks have already placed their less critical application to cloud computing as a low-risk exercise. The major benefits to the bank are:
• No upfront capital costs and reduced technology costs
• Faster implementation • High flexibility and scalability
• Multi-channel reach -
Tackling the theft of data
Efma Journal (Efma journal n° 239 July August 2013 page 24-25)
Efma journal n° 239 July August 2013
Tackling the theft of data
The rising incidence of cardholder data theft has become a major concern for banks. Besides leading to fraud and operational losses, the impact on a bank’s reputation is significant. Ratan Jyoti from Vijaya Bank explains what needs to be done to minimise risk.
-
Information system on National Pusa Insect Collection ISNPIC
Shashpa Journal 9(2): 127-132
This is the web based information system for insect
collections is developed at Indian Agricultural Research Institute, New
Delhi by Ratan Jyoti et al., 2002. It is known as Information System on
National Pusa Insect Collection (ISNPIC), which is one of the biggest
insect collections in Asia with more than half a million specimens
comprising of approximately 17,000 identified species.Other authors -
Honors & Awards
-
Top 50 Global Thought Leaders and Influencers on Cloud Computing (January 2020)
https://www.thinkers360.com/top-50-global-thought-leaders-and-influencers-on-cloud-computing-january-2020/
Thinkers360 leaderboard for the top 50 global thought leaders and influencers on Cloud Computing for January 2020.
-
100 B2B Thought Leaders and Influencers to Follow in 2020
https://www.thinkers360.com/100-b2b-thought-leaders-and-influencers-to-follow-in-2020/
Thinkers360 leaderboard for the top 100 global thought leaders and influencers on Technology for December 2019.
-
CSO 100 Award 2019
IDG Media
-
Champion CISO 2019
Dynamic CISO
-
Infosec Maestro 2018
www.infosecuritylive.com
This award aims to bring to the centre stage the contribution security officers make in the shaping and securing the integrity of our businesses. The purpose of the award is to inspire the young talented information security professionals and researchers to come forward with path breaking technological innovations to keep organizations ahead and secure.
-
CISO Platform 2018
CISO Platform
-
Infosec Maestros Award 2017
BitStream Mediaworks Pvt. Ltd.
The ‘INFOSEC MAESTROS’ Awards felicitates organizations (and the people within them) that are using information security technology in innovative ways to secure their business and mission critical information in the most effective manner and deliver business value, by creating competitive advantage, optimizing business processes, enabling growth or improving relationships with customers.
-
DynamicCISO - Magnificent Seven award
Dynamic CISO
In dynamicCISO Summit 2017 , I received the Magnificent Seven award and was honored as one of the seven security leaders across India who have contributed to the industry and helped raise awareness about security issues at various levels.
-
Infosec Maestros Award 2016-India’s top most honour for CISOs/ Infosec leaders
InfoSecurity Magazine
Info Sec, a leading Magazine on Information Security workforce calls for nominations for “INFOSEC MAESTROS” annually. This award is granted in recognition of the talent, contributions and innovations of information security leaders, who have significantly contributed to the enhancement of the information security workforce by demonstrating a leadership role in any information security workforce improvement initiative, program or project. Infosec Maestro awards for the year 2016 were announced…
Info Sec, a leading Magazine on Information Security workforce calls for nominations for “INFOSEC MAESTROS” annually. This award is granted in recognition of the talent, contributions and innovations of information security leaders, who have significantly contributed to the enhancement of the information security workforce by demonstrating a leadership role in any information security workforce improvement initiative, program or project. Infosec Maestro awards for the year 2016 were announced during Feb 2016. The panel of eminent juries of “Infosecurity” magazine has selected top 100 CISO Awards on a pan India basis.
Recommendations received
30 people have recommended Ratan
Join now to viewMore activity by Ratan
-
Elevating teams is key to organizational success, and as an advisor, I’m excited to share how our simple yet effective methods can empower teams to…
Elevating teams is key to organizational success, and as an advisor, I’m excited to share how our simple yet effective methods can empower teams to…
Liked by Ratan Jyoti
-
Consent management as envisaged in DPDP Act India
Consent management as envisaged in DPDP Act India
Liked by Ratan Jyoti
-
##Morning #Vibes "We know very far less about ourselves than we feel we do" ##Success ##Empowerment ##ThoughtfulARTEE
##Morning #Vibes "We know very far less about ourselves than we feel we do" ##Success ##Empowerment ##ThoughtfulARTEE
Liked by Ratan Jyoti
-
🔒 Navigating Regulatory and Technological Shifts in IIoT Security 🌐 In the rapidly evolving Industrial IoT (IIoT) landscape, staying ahead of…
🔒 Navigating Regulatory and Technological Shifts in IIoT Security 🌐 In the rapidly evolving Industrial IoT (IIoT) landscape, staying ahead of…
Liked by Ratan Jyoti
-
What does it take to be an AI first-mover in banking and financial services? In the past week, I had the privilege of hosting CxO Round Tables in…
What does it take to be an AI first-mover in banking and financial services? In the past week, I had the privilege of hosting CxO Round Tables in…
Liked by Ratan Jyoti
-
How do we stay connected with our 23,000-strong team at Ujjivan SFB? This is a question we get asked often. So, we're pulling back the curtain on…
How do we stay connected with our 23,000-strong team at Ujjivan SFB? This is a question we get asked often. So, we're pulling back the curtain on…
Liked by Ratan Jyoti
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Ratan Jyoti in India
-
Ratan Jyoti
Human Resources Executive at Vikram Roller Flour Mills Ltd
-
Ratan Jyoti
Keen learner✨| Web developer | Machine learning Enthusiast
-
Vidya Ratan Jyoti
-
Ratan Jyoti
Optometrist at Eye q superspeciality hospital at Gurgaon
6 others named Ratan Jyoti in India are on LinkedIn
See others named Ratan Jyoti