Areas of Expertise (6)
Defense and Security
Air Force Institute of Technology: Ph.D., Systems Engineering 2014
National Defense Intelligence College: M.S., Strategic Intelligence 2007
Nova Southeastern University: M.S., Management Information Systems 2006
Excelsior College: B.S., Liberal Arts 2001
- Institute of Electrical and Electronics Engineers (IEEE) : Member
- International Council on Systems Engineering (INCOSE) : Member
- Information Systems Security Association (ISSA) : Member
- Tau Beta Pi – The Engineering Honor Society : Member
- Sigma Iota Epsilon – National Honorary and Professional Management Society : Member
Media Appearances (7)
One on One with Richard Rogers│Seeking protection against cyber attacks
Like it or not, our lives are closely connected to our computers and there are so many ways cyber thieves can target us these days. October is Cyber Security Awareness Month and Jeff Morris with the School of Computer and Cyber Sciences at Augusta University stopped by to talk to us about the importance of keeping our information secure.
NCO Earns PhD at AFIT
DVIDS - Defense Visual Information Distribution Service online
For the first time ever since the Air Force Institute of Technology opened it's doors 95 years ago, a Non-Commissioned Officer has earned a PhD. The kicker? It was an Army Soldier! Here is the story of Army MSG Jeffery Morris, a career Army soldier, who has labored up to 70 hours a week in study for several years to earn this title. His efforts will now lead him to continue his military service at the United States Military Academy where he teach and continue his research at the New Army Cyber Institute.
Cyber News Now: SRNL and Augusta University establish first joint appointment to advance cyber research
For the first time, Savannah River National Laboratory and Augusta University have appointed someone to a joint faculty position. Jeffrey Morris will advance research in cyber sciences.
Ransomware attack could delay paychecks at some companies
A ransomware attack on a large human resources company could impact employees' time and payroll right before the holidays.
Bridgestone investigates security incident, Aiken workers impacted
Operations are stalled at Bridgestone for the second night in a row. Investigators are looking into what the company calls a “potential information security incident.” Plants are down across two continents. We’re still waiting to hear back from Bridgestone on several of our questions. We’re wondering if this was a cyberattack or if it has anything to do with the Ukraine invasion. Bridgestone says it’s out of an abundance of caution to try and get as much information as they can throughout this comprehensive investigation. We spoke with one local cyber expert who says it’s easier said than done. “It is extremely difficult. They’ll start into one system, and then they’ll break into another, and then they’ll attack the target,” said Jeffrey Morris, Augusta University assistant professor, school in computer and cyber sciences.
Cyber News Now: Practicing caution with information sharing and targeted ads
If you've been online, you've likely seen targeted ads at some point. But, a local cyber expert says don't click so fast. Often, you'll see targeted ads on Facebook, Instagram or maybe even Twitter. While scrolling, these ads will pop up on your feed. “They track where you go and then you will have a digital profile that’s being built on you and then that is what is used by vendors to generate money.” said Jeffrey Morris, Augusta University School of Computer and Cyber Sciences Assistant Professor. These ads can show products or services you may be interested in based on your data. Before you agree to any privacy policies on various apps, Morris encourages you to ask yourself a question. "What is it you’re willing to give up for people to know about you?” Morris says it’s a question not many consider.
One on One with Laura Warren: Keeping safe from cyber attacks
Like it or not, we depend on technology more and more. Cyber thieves are finding new ways to take advantage of us. October is Cyber Security Awareness Month and Jeff Morris, with the School of Computer and Cyber Sciences at Augusta University, is here to talk about it one on one with Laura Warren.
Cyber Talent for Unified Land OperationsSmall Wars Journal
2016 The Army is well on path to build their required portion of the US Cyber Command’s Cyber Mission Force to meet strategic objectives. It’s now time to address the impending need for cyber-enabled tactical operations and Service demands. Our strategy should be focused on the ways and means of creating an organization that allows the Army to lead in this domain while achieving the Combatant Commander’s objectives, enabling Army operations across a full spectrum of combat in support of all levels of command.
Cyber Aptitude Assessment: Finding the Next Generation of Enlisted Cyber SoldiersCyber Defense Review
2015 As noted in the 2013 DoD Cyberspace Workforce Strategy, not all cyberspace personnel will have a STEM background, but instead will come from a broad variety of backgrounds. The problem is trying to find personnel having the knowledge and aptitude for cyberspace operations. There are many instruments available to measure knowledge, but there few that measure aptitude.
Implications of Quantum Information Processing On Military OperationsCyber Defense Review
2015 This paper discusses the benefits and drawbacks of quantum computing and quantum cryptography, subsets of the field of Quantum Information Processing (QIP). This field uses quantum mechanics for information processing rather than classical mechanics and portends game-changing implications to technologies long-relied on by military organizations, including computing, communication, and cryptographic systems.
A Modeling Framework for Studying Quantum Key Distribution System Implementation NonidealitiesIEEE Access
2015 Quantum key distribution (QKD) is an innovative technology that exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared key for use in cryptographic applications. However, QKD is a relatively nascent technology where real-world system implementations differ significantly from their ideal theoretical representations.
Using the Discrete Event System Specification to Model Quantum Key Distribution System ComponentsJournal of Defense Modeling and Simulation
2014 In this paper, we present modeling a Quantum Key Distribution (QKD) system with its components using the Discrete Event System Specification (DEVS) formalism. The DEVS formalism assures the developed component models are composable and exhibit well-defined temporal behavior independent of the simulation environment. These attributes enable users to assemble a valid simulation using any collection of compatible components to represent complete QKD system architectures.