Michael Nowatkowski, PhD

Professor; Director, AU Cyber Institute Augusta University

  • Augusta GA

A leading cybersecurity expert available to discuss online security, ransomware, and device security topics.

Contact

Augusta University

View more experts managed by Augusta University

Spotlight

2 min

Protecting the home front: Cities battle to keep computer systems safe from cyberattack

Hackers continue to make more frequent and sophisticated attempts to infiltrate municipalities and government computer systems. In the past few months, Augusta, Georgia, and Dallas, Texas, are among the cities that have experienced system breaches. Some of the unauthorized access is caused by employees simply clicking on a wrong link, while others are premeditated attempts to steal data through the breach. They aren’t easy to defend, but everyone, including individuals, governments and businesses, must be vigilant when it comes to protocols and security. Michael Nowatkowski is the head of the cyber program of study in the School of Computer and Cyber Sciences at Augusta University and knows there are a lot of bad actors out there. “There’s potential, if they are able to get onto your system, that it would be something like ransomware, where they would prevent you from using your data,” said Nowatkowski. He added it might not be just for monetary gain. They could simply eavesdrop and collect data without anyone’s knowledge. “You want to find them as quickly as possible so they can’t perform these malicious activities or sit in a dormant state just collecting data for a long period of time,” he added. When it comes to attacks on cities, Nowatkowski said the bad actors may just want to discredit the city or agency by defacing their web pages. In other cases, they may force a ransomware attack to get money out of the city to re-access the data. He added it’s a challenge to prepare and defend for the attacks, as you never know what the attack vector is going to be. “For cities to defend, they always have to be vigilant. They should try to encourage their users to use the systems responsibly. User education is a very big step and is a proactive step in defending your networks,” said Nowatkowski. He also said if an attack did happen, it’s important to look for ways to prevent future attacks, try to figure out the root cause of how the attack happened and put measures into place to prevent them from happening in the future. This may include having a third party conduct an assessment of the network to look for vulnerabilities. If you’re a journalist look to know more or have been assigned to cover any aspect of cybersecurity in the nation, then let our experts help with your coverage. Dr. Michael Nowatkowski is an associate professor with the School of Computer and Cyber Sciences at Augusta University. He also serves as the head of the cyber program of study. Nowatkowski is available to speak with media regarding the emerging threat of cybersecurity in America. Simply click on his icon now to arrange an interview today.

Michael Nowatkowski, PhD

2 min

Cyber-attacks are rising to the top of American concerns

With the rising occurrence of cyber-attacks across America, institutions, banks, government agencies and top-tier companies are now either falling victim or feeling vulnerable to attack from online enemies abroad. It’s a topic that is now front and center that has most leaders regardless of poltical party in agreement and media across the country are starting to cover with more depth and seriousness. Most Americans across party lines have serious concerns about cyberattacks on U.S. computer systems and view China and Russia as major threats, according to a new poll. The poll by The Pearson Institute and The Associated Press-NORC Center for Public Affairs Research shows that about 9 in 10 Americans are at least somewhat concerned about hacking that involves their personal information, financial institutions, government agencies or certain utilities. About two-thirds say they are very or extremely concerned. Roughly three-quarters say the Chinese and Russian governments are major threats to the cybersecurity of the U.S. government, and at least half also see the Iranian government and non-government bodies as threatening. October 11 – Associated Press "I am really interested in the security of our critical infrastructure systems," said Dr. Michael Nowatkowski. " If an attacker were able to shut those systems down, great harm would result. This is a national security issue." If you’re a journalist look to know more or have been assigned to cover any aspect of cyber-security in the country, then let our experts help with your coverage. Dr. Michael Nowatkowski is an Associate Professor with the School of Computer and Cyber Sciences at Augusta University. He also serves as the Head of the Cyber Program of Study. Nowatkowski is available to speak with media regarding the emerging threat of cyber-security in America, simply click on his icon now to arrange an interview today.

Michael Nowatkowski, PhD

Multimedia

Social

Biography

Dr. Michael Nowatkowski is a professor with Augusta University's School of Computer and Cyber Sciences. He also serves as the director of AU’s Cyber Institute and head of Cyber Programs of Study.

Areas of Expertise

Hardware and Embedded Systems
Cellular and Mobile Technology
Defensive Cyber Operations
Cyber Operations Education
TCP/IP Protocol Analysis
Control System Security
Medical Device Security
Information Assurance
Electronics

Education

Georgia Institute of Technology

Ph.D.

Electrical and Computer Engineering

2010

Georgia Institute of Technology

M.S.

Electrical and Computer Engineering

2000

Air Force Institute of Technology

TOOC

Teleprocessing Operations Officer Course

1991

Show All +

Affiliations

  • Association for Computing Machinery (ACM)
  • Eta Kappa Nu, National Electrical and Computer Engineering Honor Society
  • InfraGard - InfraGard is a partnership between the Federal Bureau of Investigation (FBI) and members of the private sector for the protection of U.S. Critical Infrastructure
  • International Information System Security Certification Consortium (ISC)²
  • American Radio Relay League, ARRL (Amateur Extra, KO4ASU)
Show All +

Media Appearances

Chinese cameras may be able to spy on U.S. infrastructure; according to DHS bulletin

The National News Desk  online

2025-02-06

According to a new bulletin released by the Department of Homeland Security, cameras made in China may be able to spy on U.S. infrastructure. Officials say the internet-connected cameras allow the Chinese government to conduct espionage or disrupt U.S. critical infrastructure.

Michael Nowatkowski, who specializes in cybersecurity at Augusta University says, tens of thousands of these Chinese-made cameras are connected to the networks of U.S. infrastructure.

"They may be designed with backdoors that allow remote connectivity into those cameras even without the knowledge of the owner," Nowatkowski said.

View More

AI power needs grow; data centers could use more electricity than some cities

The National Desk  tv

2024-11-25

Geoff Harris and Michael Nowatkowski, PhD, break down how much power artificial intelligence data centers will need to run.

View More

AI will likely boost data center power demand over 150% by 2030

The National Desk  tv

2024-08-13

Data center power demand will grow 160% by 2030, largely because of artificial intelligence, a new study from Goldman Sachs Research says.

Chrysta Castaneda, a lawyer with expertise in the energy industry said the amount of bandwidth needed to run an AI search is much greater than people realize.

"So much more computers are needed and so much more electricity is needed to run the computers," Castaneda said.

According to The International Energy Agency, a single-use ChatGPT question requires 2.9-watt hours of electricity compared to the 0.3-watt hours for a Google search.

A professor of cyber sciences at Augusta University, Michael Nowatkowski, said using all this additional power for AI could create some problems.

That could cause more severe brownouts or even loss of power depending on the demand placed on the power grid," said Nowatkowski.

Fariba Mamaghani with Tulane University's Business School said the price of the power market can be determined by the demand. So if demand goes up, so too will prices.

View More

Show All +

Answers

In going after your Apple ID, cyber criminals will send you a text message, claiming to be from Apple. They will then ask you to click on a link to access an "important message," what happens next?  
Michael Nowatkowski, PhD

You will click on a link and it will go to what appears to be a legitimate page but it's really just something that's been recreated. From there, the fake website will then ask users to hand over their Apple ID information. That would give someone access to your contacts, your payment information

A warning has been issued to all iPhone users after tech experts discovered a new cyberattack targeting Apple IDs, what are they after?
Michael Nowatkowski, PhD

In this case it's an Apple ID. Your Apple ID is what really opens your phone and you can really think of it as like a master key.

What are some concerns if a cyber attack happens with a city's computer system?
Michael Nowatkowski, PhD

So some concerns are always they would want to steal your data that sometimes referred to as a breach where they are going to take your data. There's also potential if they are able to get into your system that it would be something like ransomware, where they would prevent you from using your data. There are other that they could do if they get into your network. They could just sit there and evesdrop and continue to collect your data without your knowledge.

Show More +

Articles

Medical Devices: Reverse Engineering for Innovation and Advancement in Healthcare

Institute of Electrical and Electronics Engineers

Dillon Tauscher; Michael Nowatkowski, PhD; Jeffrey Morris, PhD; David Baldwin

2024-04-24

Research suggests medical devices are particularly vulnerable to wireless attacks- whether using conventional or non-conventional protocols. This study provides analysis and comparison of several selected medical devices that will model a functional wireless network, communicating between patient and host. Results enable the identification and detection of attack vectors or vulnerabilities in devices and categorically allow for placement into a model akin to the Purdue/TCP/IP models-focusing on Medical Internet of Things (MIoT). The interconnectivity of multiple devices lends itself to a variety of security issues, including man-in-the-middle attacks. Interception, jamming, and altering of traffic from embedded, wearable, and bedside devices. These have serious consequences regardless of initial intent- as human life and safety are at stake. This study will not only contribute to the advancement of medical device security, but also to improve patient safety, data privacy, and reliability of interconnected healthcare technologies and delivery.

View more

Jack Voltaic Critical Infrastructure and Public-Private Partnerships

ACI Technical Reports

Michael Nowatkowski, et al.

2019

This report summarizes the U.S. Army Cyber Institute’s (ACI’s) work to date on Jack Voltaic (JV), a research project that focuses on critical infrastructure and public-private partnerships (PPPs). JV research, which includes contributions from academia, industry, and government, explores how to synchronize Department of Defense (DoD)/U.S. Government and private sector capabilities in a cyberspace attack response. JV is a research framework that enables the Army to recognize the impacts of cyberspace operations from a municipal and critical infrastructure perspective.

View more

Hardware Reverse Engineering Tools and Techniques

2019 SoutheastCon

Thomas Gordon, Eric Kilgore, Nick Wylds, Michael Nowatkowski

2019

The immediate goal of this work is to determine uses for different hardware reverse engineering tools, compare and contrast which tools correspond with desired tasks, and provide an outline to achieve hardware reverse engineering goals for students or entry level engineers.

View more

Show All +