Du Bois, Pennsylvania, United States
18K followers 500+ connections

Join to view profile

About

I aspire to be a servant leader with compassion. I have the honor and pleasure of serving…

Courses by Jungwoo

See all courses

Articles by Jungwoo

  • Ethics and Decision-Making in the Use of Generative AI

    Introduction How we met and started our conversation on AI as it was affecting both of our work areas. JR: As an…

    3 Comments
  • My Toastmasters Journey

    I have come a long way as a speaker who aspires to motivate and inspire people. My public speaking journey began when…

    8 Comments
  • Career Insight from an Amazon.com Machine Learning Scientist

    I recently invited Dr. Hyokun Yun, machine learning scientist at Amazon.

    2 Comments
  • ICSSA 2020 Wrap-up

    When the Corona pandemic started in March this year, the organizers of the International Conference on Software…

  • Compassion is the only way to success!

    Compassion is in high demand these days more than any other time. My working definition of compassion for this article…

    6 Comments
  • Job Search 101: Employers Perspective

    During our recent business advisory council meeting, we discussed what employers look for throughout their hiring…

    1 Comment
  • Third Data Science Educators Workshop

    I am the Principal Investigator (PI) of the National Science Foundation project: “Building a Big Data Analytics…

    2 Comments
  • ABET Renews Its Accreditation for Penn State Altoona EMET.

    We just received wonderful news from ABET (Accreditation Board for Engineering and Technology)! They renewed their…

  • PA House Transportation Committee Visits Penn State RTE Program

    Earlier this week I had a chance to witness our government in action. On August 28th, the Altoona Railroaders museum…

  • It's OK to Be a Chameleon!

    Effective communication is a critical skill for leaders. As of this writing, I am working on my Toastmasters Dynamic…

    5 Comments

Activity

Join now to see all activity

Experience & Education

  • Penn State DuBois

View Jungwoo’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • Central Pennsylvania Chapter President

    Korean Scientists and Engineers Association (KSEA)

    - 14 years 10 months

    Science and Technology

    I served as the president of the Central Pennsylvania chapter of KSEA. In my capacity as chapter president, I was a faculty adviser for the chapter and assisted members in organizing various networking events.

  • Toastmasters International Graphic

    Vice President of Education

    Toastmasters International

    - 1 year

    Education

    I am serving the State College Toastmasters club.

  • Toastmasters International Graphic

    Area Director

    Toastmasters International

    - 1 year

    Education

  • Toastmasters International Graphic

    President

    Toastmasters International

    - 10 months

    Education

    I served as the President of Achievers Club 902 (District 13, Division C, Area 24).

  • IEEE Communications Society Graphic

    Technical Editor

    IEEE Communications Society

    - 9 years

    Science and Technology

    I served as a Technical Editor for the IEEE Communications magazine.

  • AI Applied Consortium Graphic

    Trustee

    AI Applied Consortium

    - Present 6 years 3 months

    Education

    I provide oversight and feedback.

  • DuBois Toastmasters Club Graphic

    President

    DuBois Toastmasters Club

    - 5 months

    Education

    I served as the inaugural president of the DuBois Toastmasters Club when it was rechartered in March 2024.

  • DuBois Toastmasters Club Graphic

    Sergeant at Arms

    DuBois Toastmasters Club

    - Present 9 months

    Education

    I prepare the room for our meetings and introduce the president at each meeting. I also manage our club properties.

Publications

  • The age of hacking brings a return to the physical key

    TheConversation.com

    Even as text-message two-factor authentication is just starting to become common, a newer method, a return to the era of the physical key, is nipping at its heels.

    See publication
  • Machine learning and big data know it wasn’t you who just swiped your credit card

    TheConversation.com

    Black Friday kicks off the end-of-year shopping whirlwind. How does your credit card issuer watch out for fraudulent purchases on your account amid all those…

    See publication
  • A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider

    The 2015 The 1st International Conference on Software Security and Assurance (ICSSA'15)

    Other authors
  • Design Patterns with Python

    Lynda.com

    Design patterns encourage programming efficiency and code reuse. This course is a look at traditional design patterns as applied to Python. Jungwoo Ryoo covers 15 essential creational, structural, and behavioral patterns to help you solve common coding challenges, while introducing best practices that will keep your solutions consistent, complete, and correct.

    Topics include:
    1. Understanding design patterns
    2. Best design practices: consistency, completeness, and correctness
    3.…

    Design patterns encourage programming efficiency and code reuse. This course is a look at traditional design patterns as applied to Python. Jungwoo Ryoo covers 15 essential creational, structural, and behavioral patterns to help you solve common coding challenges, while introducing best practices that will keep your solutions consistent, complete, and correct.

    Topics include:
    1. Understanding design patterns
    2. Best design practices: consistency, completeness, and correctness
    3. Working with creational patterns
    4. Working with structural patterns
    5. Working with behavioral patterns

    See publication
  • Protect Your Network with Open-Source Software

    lynda.com

    I teach network security at Penn State, and this Lynda opportunity was great for me to capture the essence of what I teach to my undergraduate students. The following is the official Lynda course description!

    Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely FREE. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet…

    I teach network security at Penn State, and this Lynda opportunity was great for me to capture the essence of what I teach to my undergraduate students. The following is the official Lynda course description!

    Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely FREE. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network.

    Topics include:

    *Setting up a host firewall
    *Setting up a host as a network firewall
    *Setting up a DMZ
    *Capturing and analyzing packets with Wireshark
    *Using Snort to detect network intrusions
    *Logging network activity with syslog-ng, Kiwi, and other solutions
    *Setting up a simple network management protocol (SNMP)

    See publication
  • Cloud Security Auditing: Challenges and Emerging Approaches

    IEEE Security and Privacy

    An Information Technology (IT) auditor collects information on an organization's information systems, practices, and operations and critically analyzes the information for improvement. One of the primary goals of an IT audit is to determine if the information system and its maintainers are meeting both the legal expectations of protecting customer data and the company standards of achieving financial successes against various security threats. These goals are still relevant to the newly…

    An Information Technology (IT) auditor collects information on an organization's information systems, practices, and operations and critically analyzes the information for improvement. One of the primary goals of an IT audit is to determine if the information system and its maintainers are meeting both the legal expectations of protecting customer data and the company standards of achieving financial successes against various security threats. These goals are still relevant to the newly emerging cloud computing model of business, but with a need for customization. We believe that there are clear differences between cloud and traditional IT security auditing, which is validated by our interviews with cloud security auditors. Therefore, this paper explores potential challenges unique to cloud security auditing. The paper also examines additional challenges specific to particular cloud computing domains such as banking, medical, and government sectors. Finally, we present emerging cloud-specific security auditing approaches and provide our critical analysis.

    Other authors
    See publication
  • Approaching Security from an "Architecture First" Perspective

    Software Engineering Institute (SEI)

    Presentation at SATURN 2014. The results of our case studies indicate that a strategic, system-wide, architectural approach to security, implemented through the partial or full adoption of security frameworks, results in the best outcome.

    Other authors
    See publication
  • Computer Forensics Essential Training

    lynda.com

    I am teaching a computer forensics at Penn State. Due to my familiarity with the topic, I had this wonderful opportunity to develop an online introductory course on Computer Forensics in collaboration with lynda.com.

    See publication
  • Broadband connectivity: Wired and wireless Internet technologies in South Korea and the United States

    Conference

    This paper written for the 2010 International Conference on Business, Economics and Information Technology (ICBEIT) examined and discussed the differences between the wired and wireless technologies that, at the time, were available in the United States and South Korea.

  • Architectural Analysis of Security Vulnerabilities

    IEEE Security and Privacy

    Accepted and to be published!

    Other authors
Join now to see all publications

Honors & Awards

  • Best Paper Award

    ACM International Conference on Ubiquitous Information Management and Communication (IMCOM) 2015

  • New Directions Presentation Award

    IEEE Software and Software Engineering Institute (SEI) Architecture Technology User Network (SATURN) conference

    The tenth annual SATURN conference

  • The University-wide IST Faculty Award of the Year Award

    Penn State College of IST

  • Outstanding Achievement in Research and Creativity

    Penn State Altoona

Languages

  • Korean

    Native or bilingual proficiency

  • English

    Native or bilingual proficiency

  • German

    Elementary proficiency

Recommendations received

44 people have recommended Jungwoo

Join now to view

More activity by Jungwoo

View Jungwoo’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jungwoo directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses