Ratan Jyoti

Bengaluru, Karnataka, India Contact Info
24K followers 500+ connections

Join to view profile

About

Steering the cybersecurity helm at Ujjivan Small Finance Bank, my role encapsulates…

Articles by Ratan

See all articles

Contributions

Activity

Join now to see all activity

Experience & Education

  • Ujjivan Small Finance Bank Limited

View Ratan’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Publications

  • Will Blockchain Replace Banks?

    CPO Magzine

    Blockchain is today’s most discussed technology and will remain so for more time. Crypto Society most often criticizes banks for being over-centralized and many times being overpriced and monopolistic. In contrast, Blockchain can be a viable option as it is decentralized and a cost-effective solution.

    See publication
  • Will the Self-Securing Cloud Replace Security Professionals?

    CPO Magazine

    To expand banking business to new customers, new channels, new geography and new markets, cloud computing is an effective tool. Cloud computing is not only expandable and swift but provides competitive advantage and better customer service with significantly less infrastructure costs. Some organizations have reported that business simulations which took more than 20 hours in a physical infrastructure setup took just 20 minutes in a cloud infrastructure. This alone explains the capability of…

    To expand banking business to new customers, new channels, new geography and new markets, cloud computing is an effective tool. Cloud computing is not only expandable and swift but provides competitive advantage and better customer service with significantly less infrastructure costs. Some organizations have reported that business simulations which took more than 20 hours in a physical infrastructure setup took just 20 minutes in a cloud infrastructure. This alone explains the capability of cloud-based infrastructures. However, questions have been raised about the security of such an infrastructure.

    See publication
  • Are Human necessary to Cyber Threat Intelligence?

    CSO Forum

    Given the increasing financial and reputational costs of breaches, an organization can no longer overlook human aspect of Cyber Intelligence

    See publication
  • Tackling SYN Flood attacks

    Hakin9 Media

    In a TCP SYN flood attack, the malicious client begins a three way handshake which the client never finishes. The client only sends TCP SYN packets and no final ACK packets, and by virtue of which the server reserves memory slots for each incomplete connection. By this process, the server’s memory gets filled with increasing incomplete connections until the server can no longer no longer accept the other incoming requests (both genuine and malicious) in want of free memory. The goal of this…

    In a TCP SYN flood attack, the malicious client begins a three way handshake which the client never finishes. The client only sends TCP SYN packets and no final ACK packets, and by virtue of which the server reserves memory slots for each incomplete connection. By this process, the server’s memory gets filled with increasing incomplete connections until the server can no longer no longer accept the other incoming requests (both genuine and malicious) in want of free memory. The goal of this simple technique is to deny the TCP services to the legitimate clients by creating a large number of half open TCP connections that fill the host’s listen queue. Usually, these TCP SYN packets use counterfeit IP addresses to prevent detection and because of these nonexistent IP addresses, no responses are returned to the server.

    See publication
  • Data Security and Privacy concerns for the Indian Banking Industry

    http://www.cioreview.in/

    The era of internet escalated banking has brought the banking channels to customer’s hand. This is possible because of communications and exchange of a very large set of data. Many of these communications involves interchange of confidential data. As the data belongs to customers, their security is the prime concerns for the banks. Privacy preservation is of also equally important as no party can be trusted enough over the public networks without checks and verification.

    See publication
  • Banking in the Cloud

    Efma Online

    To expand banking business to new customers, new channels, new geography and new markets, cloud computing is an effective tool. However, questions have been raised about the security of such an infrastructure.

    See publication
  • Wireless Sniffing through KARMETASPLOIT

    Hakin9 Media

    Wireless Sniffing through KARMETASPLOIT

    By Ratan Jyoti

    Karmetasploit is a Metasploit implementation of famous wireless sniffing tool KARMA (KARMA Attacks Radioed Machines Automatically) which passively listens to 802.11 Probe Request frames. Wireless Clients are generally targeted by creating Rogue AP and harvesting of user credentials which is carried out by exploiting client side vulnerabilities.

    See publication
  • Tackling Layer 7 DDoS Attacks

    Hakin9

    Distributed Denial of Service (DDoS) attack is a strewn challenge where the spurious or fake packets are sent to the victim in abnormally large number. DDoS attempts to block important services running on victim’s server by flooding the victim’s server with packets. The difference with DoS is that DDoS attacks do not originate from a single host or network but from multiple hosts or networks which might have already been compromised. One of the main challenges here is to find the location of…

    Distributed Denial of Service (DDoS) attack is a strewn challenge where the spurious or fake packets are sent to the victim in abnormally large number. DDoS attempts to block important services running on victim’s server by flooding the victim’s server with packets. The difference with DoS is that DDoS attacks do not originate from a single host or network but from multiple hosts or networks which might have already been compromised. One of the main challenges here is to find the location of attackers and then block traffic at points near to the source of the attacks. Layer 7 DDoS attacks target the application layer at web or mail servers (eg. HTTP(S), SMTP, FTP etc) such that the service can be denied in effective way to bring web server to lock up or crash. Since they operate at the application protocol level which is OSI Layer 7 ,this attack is known as Layer 7 DDoS attack…

    See publication
  • Securing The Cloud To Drive Business

    Silicon India

    Banking with the cloud is definitely a game changer

    The burden of possessing, managing and maintaining the IT infrastructure has been the key challenge for financial sector. Banking with the cloud has definitely been a game changer. Many banks have already placed their less critical application to cloud computing as a low-risk exercise. The major benefits to the bank are:
    • No upfront capital costs and reduced technology costs
    • Faster implementation • High flexibility and…

    Banking with the cloud is definitely a game changer

    The burden of possessing, managing and maintaining the IT infrastructure has been the key challenge for financial sector. Banking with the cloud has definitely been a game changer. Many banks have already placed their less critical application to cloud computing as a low-risk exercise. The major benefits to the bank are:
    • No upfront capital costs and reduced technology costs
    • Faster implementation • High flexibility and scalability
    • Multi-channel reach

    See publication
  • Tackling the theft of data

    Efma Journal (Efma journal n° 239 July August 2013 page 24-25)

    Efma journal n° 239 July August 2013

    Tackling the theft of data

    The rising incidence of cardholder data theft has become a major concern for banks. Besides leading to fraud and operational losses, the impact on a bank’s reputation is significant. Ratan Jyoti from Vijaya Bank explains what needs to be done to minimise risk.

    See publication
  • Information system on National Pusa Insect Collection ISNPIC

    Shashpa Journal 9(2): 127-132

    This is the web based information system for insect
    collections is developed at Indian Agricultural Research Institute, New
    Delhi by Ratan Jyoti et al., 2002. It is known as Information System on
    National Pusa Insect Collection (ISNPIC), which is one of the biggest
    insect collections in Asia with more than half a million specimens
    comprising of approximately 17,000 identified species.

    Other authors
    • Dr. P K Malhotra
    • Dr. Debjani Dey
    See publication

Honors & Awards

  • Top 50 Global Thought Leaders and Influencers on Cloud Computing (January 2020)

    https://www.thinkers360.com/top-50-global-thought-leaders-and-influencers-on-cloud-computing-january-2020/

    Thinkers360 leaderboard for the top 50 global thought leaders and influencers on Cloud Computing for January 2020.

  • 100 B2B Thought Leaders and Influencers to Follow in 2020

    https://www.thinkers360.com/100-b2b-thought-leaders-and-influencers-to-follow-in-2020/

    Thinkers360 leaderboard for the top 100 global thought leaders and influencers on Technology for December 2019.

  • CSO 100 Award 2019

    IDG Media

  • Champion CISO 2019

    Dynamic CISO

  • Infosec Maestro 2018

    www.infosecuritylive.com

    This award aims to bring to the centre stage the contribution security officers make in the shaping and securing the integrity of our businesses. The purpose of the award is to inspire the young talented information security professionals and researchers to come forward with path breaking technological innovations to keep organizations ahead and secure.

  • CISO Platform 2018

    CISO Platform

  • Infosec Maestros Award 2017

    BitStream Mediaworks Pvt. Ltd.

    The ‘INFOSEC MAESTROS’ Awards felicitates organizations (and the people within them) that are using information security technology in innovative ways to secure their business and mission critical information in the most effective manner and deliver business value, by creating competitive advantage, optimizing business processes, enabling growth or improving relationships with customers.

  • DynamicCISO - Magnificent Seven award

    Dynamic CISO

    In dynamicCISO Summit 2017 , I received the Magnificent Seven award and was honored as one of the seven security leaders across India who have contributed to the industry and helped raise awareness about security issues at various levels.

  • Infosec Maestros Award 2016-India’s top most honour for CISOs/ Infosec leaders

    InfoSecurity Magazine

    Info Sec, a leading Magazine on Information Security workforce calls for nominations for “INFOSEC MAESTROS” annually. This award is granted in recognition of the talent, contributions and innovations of information security leaders, who have significantly contributed to the enhancement of the information security workforce by demonstrating a leadership role in any information security workforce improvement initiative, program or project. Infosec Maestro awards for the year 2016 were announced…

    Info Sec, a leading Magazine on Information Security workforce calls for nominations for “INFOSEC MAESTROS” annually. This award is granted in recognition of the talent, contributions and innovations of information security leaders, who have significantly contributed to the enhancement of the information security workforce by demonstrating a leadership role in any information security workforce improvement initiative, program or project. Infosec Maestro awards for the year 2016 were announced during Feb 2016. The panel of eminent juries of “Infosecurity” magazine has selected top 100 CISO Awards on a pan India basis.

Recommendations received

More activity by Ratan

View Ratan’s full profile

  • See who you know in common
  • Get introduced
  • Contact Ratan directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Ratan Jyoti in India

Add new skills with these courses