- Know what the naturalistic fallacy is and know Hume’s argument establishing the fallacy
- Why a concern for the environment could be characterized as derivative under his approach
“Two virtues that Hill relates to environmental concerns
Humility/proper pride: a sense of one’s relative importance with respect to other human beings. Hill argues that the non-environmentalism is the person who sees nature strictly as a resource to be used as we see fit, even if this involves massive destruction of natural environment – lacks proper humility.
Proper gratitude: people who have no tendency to cherish things that give them
pleasure may be poorly disposed to respond gratefully to persons who are good to them. The person who feels no such “gratitude” toward nature is unlikely to show proper gratitude toward people.”
With the usage of the Nmap command on the host using Kali 2 Linux OS in the network, one can discover which ports were open on the firewall. The firewall is allowing all incoming traffic from outside network and Windows attack machine over some exposed network ports. It allows traffic from outside users on the WAN (WWW/Internet) to utilize services on a computer machine on the Internal network especially SMTP, POP3, HTTP, TELNET and FTP. The data stream incoming to the internal LAN address from Windows Machine over the open/exposed TCP ports e.g. port 21, 23, 80, 110, and 25 and postgresql and some unknown ports are most threatening for the core network (for reference see the result in the screenshot of the firewall scan performed on the internal firewall (Windows Server Firewall with LAN Address 203.0.113.100). Figure 1. Firewall scan for open port using Nmap Virtual Machine (Host) The image below shows all open ports on the Server. This is a big risk to the Virtual Machine (host) because certain open ports can send out information in plain text, which is readable to anyone that can capture it. The ports that were closed in the firewall also posed a threat to the Virtual Machine (host) running Linux 2 Kali OS from external attack machine with IP address 188.8.131.52. The unnecessary open ports can allow unwanted access into the network and into the Virtual Machine host as well. One of the major vulnerabilities presents on the Windows Server was Postgresql.exploit. This exploit can be used to create a session if the proper antivirus or malware protections were not installed onto the Windows server, as was the case. Figure 2. Checking for inbound traffic through firewall towards host machine and internal network from outside attack machine Malicious Software Protection From the lab output, it is evident that security update and patches are installed on the Windows Server machine. Security updates in the Windows machine are applied for workstation protection. An anti-malware/anti-virus software program named Microsoft Security Essentials is there installed on the Windows Server machine (192.168.1.10) (see screenshot). The scan performed to find and sense a possible risk on the workstation using Windows Server OS. It constantly observed and witnessed with Security Essentials program. Any gap in malicious software avoidance e.g. breaks in installation of Microsoft Security Essentials outcome in deleting or encoding confident>GET ANSWER