Given the increasing longevity of Americans and the costs of providing long-term care, anticipation of the costs should be a major element of every family’s financial planning. Current information suggests however, that very few families or individuals give this consideration. What factors might impede this advance planning? What measures might be effective in raising awareness among Americans about this important matter?
.Identify the major factors that have resulted in the shift in utilization from inpatient hospitalization to ambulatory care services. What are the implications of this shift for hospitals, consumers, and the health care delivery system as a whole?
oes the exploitation of VPN protocols occur? PPTP (Point-to-Point Tunnelling Protocol) is a protocol in a VPN which is decrypted by Bullrun to collect data on the client side. All of this is acquired through XKeyScore. Government programs themselves contain vulnerabilities; so how can we trust them when they say that mass surveillance processes are secure? In most programs security is a significant issue as anyone can tap into the program to re-route the data into their network. This is extremely dangerous if their systems are insecure as individuals with ill intent can garner access to extremely important information. Yet the government still expects us to cooperate while they are data mining. IPSEC (Internet Protocol Security) is another protocol used. ISPEC is seen to be very secure in contrast to PPTP, which is considered very insecure, but viable commercially. If the companies are not involved with TAO (Tailored Access Operations), then the NSA resorts to obtaining the key by compromising the security of the router to collect metadata. These schemes are very beneficial, helping to reduce crime rates and allow the government to keep with the technology available to the public. They also enable the government to locate the criminals with ease and prevent attacks from occurring. No doubt these protocols are there to ensure our safety, so if the government holds the Keys to decrypt data securely where they are hard to access by unauthorised entities, should we still be worried? Nevertheless, I may argue that the government tries to convey that these schemes are there to protect us. Nevertheless, is weakened encryption offering us protection when we are making transactions online? Are we able to say that we are protected by our government when they are the reason for weakened encryption, the only safety measure we can rely on online? If they can obtain decryption keys legally, what is stopping non-government entities from doing this illegally? If decrypting data sent online was not enough, when people tried to establish a safer network(VPN), the government found a way to decrypt them to extract content. So, is there a reason to trust the government when they do not seem to have trust in us? PRISM is another major mass surveillance program under the United States National Security Agency. This monitoring scheme collects metadata from the biggest internet providers in the US such as AT&T, Verizon and Sprint. The Laws of the Patriots Act enables the US government to obtain data from these companies. Without this law, brute force i.e network hacking would be required to gain access to such data. Other companies such as Facebook, Apple, Google and other major enterprises are also required to provide them with content. They are able to collect all of this under FISA Amendments Act Section 702.>GET ANSWER