Free Essay

Social Insecurity

In:

Submitted By nenebellamaire
Words 931
Pages 4
In the past decades, Social Security Administration has had annual revenue that excesses the amount it pays to beneficiaries. However, U.S. economy situation has created a long-term effect in many of the public organizations and departments. Social Security Administration is one of many departments that will face some economy issues during U.S. economy recovery. Social security will post nearly $600 billion in deficits over the next decade as the economy struggles to recover and millions of baby boomers stand at the brink of retirement, according to new congressional projections, (Ohlemancher, 2011). The funds that Social Security has save to payout their beneficiaries have an expiration date. In the upcoming years more people will be eligible for retirement, however, many of them will only be pay 78 percent of their benefits, (Ohlemancher, 2011). The government needs to find solutions for the upcoming deficits and be able to help Social Security Administration to no run out of funds.
Issues
In 2011, Social security administration will collect about 4.6 million retirement, survivor, and Medicare claims. 3.3 million Social Security and SSI claims and 326,000 SSI aged claims, (Social Security, 2011). These claims have to go to procedures that can take months to be approval. During these procedures, many more applicants are eligible to apply for social security and more money is pay to beneficiaries. In 2011, social security will collect $45 million less in payroll that it pays out in retirement, disability and survivor benefits, according to the nonpartisan Congressional Budget Office, (Ohlemacher, 2011).
54 million people receive retirement, disability or survivor benefits with an average payment of $1,076 a month, (Ohlemacher, 2011). Social Security Administration has being able to save and invest taxpayers money into U.S. Treasury department. The money save into U.S. treasury department accumulates interest for future Social Security beneficiaries. Social Security has built up $2.5 trillion surplus since the retirement program was last overhauled in the 1980s, (Ohlemacher, 2011)
The money that Social Security invested in the treasury department is no physically available for social security beneficiaries. The $2.5 trillion has been borrowed over the years by the federal government and spent on other programs. In a promised to pay off the surpluses Treasury department has issued bonds to Social Security, Guaranteeing payments with interest (Ohlemacher, 2011). If the situation gets worst for social security and asks federal government to pay off, there’s no way that social security will obtain the money because there’s no federal funds to pay off the debts to Social Security. This can cause delay payments to beneficiaries and future applicants.
Social Security will face deficit in the following years if congress do not take action to solve the future of the Social Security Administration. If federal government finds a solution to pay off social security, the money can run out by 2037 which is the date that many have projected, (Ohlemacher, 2011). The funds that social security currently has will be able to last for the next four years, after funds run out Social security will enter into deficit and start pushing federal government for the money that has being invested into trust funds.
Possible solutions
Cut foreign aid
The U.S. economy is not at its best situation to help others. The nation needs to help their states and citizens first before helping others. If U.S. cut foreign aid in the next years, millions of dollars can be save. The cut in foreign aid can save $17 million by 2015 or reduce the aid in half and save $17 by 2030; (LEONHARDT and MARSH, 2010). This amount does not resolve the future deficit of social security, but helps federal government from continue borrowing more money from social security trust funds. This money can be used to fund other departments and pay off other debts.
Reduce military troops in Iraq, Asia, and Europe.
Thousands of troops need to be withdrawn from the eastern countries. The military need to reduce their noncombat troops and send them back home. The creation of new missiles and new combat research need to be reduce or postpone until the economy gets better. Speed up withdrawal of Iraq/Afghanistan troops to a total of 60,000 remaining by 2015 and the nation can save up $150 million, moreover, Speed up withdrawal of Iraq/Afghanistan troops to a total of 30,000 remaining and this can save the nation $170 million, (LEONHARDT and MARSH, 2010). The creation of new missiles and new combat research need to be reduce or postpone until the economy gets better. Also, reduce the spending in space-based missile defense. Cutting military troops and programs can help the nation millions that can be use to invest in new jobs and small business opportunities. The creation of new jobs will help increase the funds in social security and reduce the future deficit in social security.
Conclusion
In the incoming years the baby boomers are going to be eligible for retirement and they will be face with a deficit of millions of dollars. The government needs to act immediately to resolve this economy crisis and be able to pay off Social Security funds with their interest that were promise. Federal government needs to cut down programs or future programs in order for social security to continue giving benefits to those 54 million people. These solutions cannot implemented right away because there are many stakeholders that have a major role in the approval of cutting programs. The government needs to take action to resolve Social Security future deficit.

Similar Documents

Premium Essay

Social Networking Anxieties and Insecurities

...Social networking anxieties and insecurities Research Questions: 1. In which social networks people are more habituated today? 2. How the social networks are affecting individual life? 3. What are the popular uses of the social networks? 4. What is the main purpose of the social networks? 5. Can a social network be an alternative of personal interaction with others? 6. What is more preferable to people, the real life or the virtual life? Hypothesis: Our today’s life has become very busy with various works. People of all ages are busy with their respective work. The progress in information technology is tremendous. And one of the most important output of this information technology is the “Social Networks”. Today the situation has become so drastic that people will forget to eat or will forget to do many important things but will never forget to check their social network ID once a day. Well, now the argument might raise that whether the social networking is bad for us. The answer is clearly no. Because each and every thing in this world their goods and bads. It totally depends on how one is using that. The main purpose of social network was to catch up the friends who live in distant place. Its main purpose was to maintain a swift communication with a lot of people. But now a days the main motive has moved to far away places. Now the rate of cyber-crime has increased a lot. Many people has lost their belongings, many have lost their identity and many...

Words: 283 - Pages: 2

Free Essay

Shyness

...addition other reasons. Researchers have found that people who are shy tend to begin their careers later than those who are not. Shy people have a harder time developing a career character. So, while if me being shy is not a problem now, it will be in the future. This also speaks for insecurity. This is also another serious problematic. It is also said that Introverts have the ability to recognize certain signs and opportunities others might not. Through the years I have found myself becoming more and more aware of those things. No matter how small they were, or where they came from, most of the time I could see a somewhat bigger meaning behind them that some others couldn't. Like the little things about other peoples' personalities; I have been surrounded by some very diverse people, who have treated me all sorts of ways and what I learned is that everything they say or don't, every move they make, or don't, every little conscious and/or unconscious gesture, it says something about them, and more often than not, I can see it. This has always been something that I've tried to work to my advantage, helping me be, at best one step ahead of others. Moreover, Being shy cause various insecurity problems. Most shy people wish they were more confident, Like me, because shyness is a symptom of being uncomfortable with who I am and with who I am around. I judge myself based on other people’s standards and spend too much time in my own head, thinking of how...

Words: 389 - Pages: 2

Premium Essay

Ryan Bingham Character Analysis

...Character Analysis: Ryan Bingham Imagine waking up tomorrow with nothing… kind of exhilarating isn’t it? This is the mantra and philosophy of the protagonist in the Oscar nominated film, “Up In The Air.” Effectively, he has constructed a life for himself where ever morning, he does wake up with nothing. He has deluded himself into thinking that this is the life he wants, so much so that he even gives motivational speeches about the merits of his way of life. He is free of the weight of family, friends, a home, or any possessions other than the elite status cards he has earned at hotels and airlines across the country. However, his confidence in his work and the lifestyle he has chosen is only a veil to cover intrinsic emotional insecurities. Does waking up tomorrow with nothing still sound exhilarating? Superficially, Ryan appears to be a picture of confidence. His entire existence is based around flying and firing people. When your career is traveling the country, putting people through the worst day of their lives, and assuring them that everything is going to be fine, confidence is a very important thing to exude. That is what makes him the best at what he does. When people leave the office having been let go, he instills at least a little hope that a new beginning is coming, and that this could be an opportunity for a new, better life. His work is his whole life. Where the goals of most people in their lives have at least something to do with family and human...

Words: 1154 - Pages: 5

Free Essay

Managning Virus

...CASE STUDY #1: MANAGING THE VIRUS HUNTERS I.    Time Context           The period in this case study is from 1999 to 2003. Vincent Weafer has been the leader of Symantec Corporation's virus hunting team since 1999. The Launch of Blaster-B worm took place in 2003.   II.    Viewpoint           This case study is about the computer virus hunters at Symantec Corporation. It focuses on the nature of their job and the managerial challenges faced by Vincent Weafer.   III.    Relevant Facts       A.    Symantec Corporation.              Symantec is a global software company. Its mission is to  provide complete online security to its customers and safety  to the cyber world. Symantec deals with the production of antivirus software, which provides protection against harmful  contents for computers. Symantec is a long-term survivor since 1982.       B.    Vincent Weafer                   Vincent Weafer has an extensive range of experience, gained from more than 20 years in the information technology industry, ranging from software development, systems engineering, to security research positions. For the past 10 years, he has been the operational leader of the Symantec Global Security Response team, where his mission is to advance the research into new computer security threats and provide security content solutions such as anti-virus, antispam, intrusion and vulnerability  response, real-time alerting, content solutions, research, and analysis.                 Weafer...

Words: 285 - Pages: 2

Free Essay

Fraud

...theft, but rather, the program was written for the security testing. Rinat developed the malware with the help of another programmer with anonymous identity, whom he had met online. His original plan was to sell the exploit; not to use it for malicious intent. 17 year old Sergey Tarasov took the readymate codes from him and added more features to it (Kumar, 2014). Rinat confessed he built the crimeware malicious code but stated he had no intentions of using it. He sold “BlakPos” malware to more than 60 eastern European cybercriminals which negatively impacted from 70 to 110 million innocent consumers. They stole credit-debit cards and personal information including names, mailing addresses, email addresses and phone numbers; no social security numbers were compromised. Tarasov has yet to confess, and his involvement is alleged at this point (Kumar, 2014). The heist took place over a 19-day period that began the day before Thanksgiving. Target identified and resolved the issue on December 15 by...

Words: 695 - Pages: 3

Free Essay

It255 Project Part 1

...Richman Investments Security Outline Richman Investments has experienced an increase in security breaches that have resulted in the loss of company proprietary information and damage to systems due to many virus and Trojan Horse infections. The following outline contains some of the security mitigation proposals to be implemented shortly. This is just a basic plan for the moment and if security breaches continue, more stringent policies will be installed. The Seven Domains of a typical IT infrastructure are as follows, with the corresponding security proposed for each domain. 1.) User domain proposal: Track and monitor abnormal employee behavior and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on Acceptable use policy (AUP) monitoring and compliance. 2.) Workstation Domain proposal: Use workstation antivirus and malicious code polices, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection. 3.) LAN Domain (including wireless LANs) proposals: Implement encryption between workstations and Wireless Access Points (WAPs) to maintain confidentiality. 4.) LAN-to-WAN Domain proposal: Conduct post configuration penetration tests of the layered security solution within the LAN-to WAN Domain. Test inbound and outbound traffic and fix any gaps. 5.) Remote Access Domain proposal: Apply first-level (i.e., user ID and password) and...

Words: 335 - Pages: 2

Free Essay

Cyber Warfare

...September 9, 2012 A New Kind of Warfare Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals and foreign governments, mainly China. Increasingly, however, the focus is on developing offensive capabilities, on figuring out how and when the United States might unleash its own malware to disrupt an adversary’s networks. That is potentially dangerous territory. Such malware is believed to have little deterrent value against criminals who use computers to steal money from banks or spies who pilfer industrial secrets. But faced with rising intrusions against computers that run America’s military systems and its essential infrastructure — its power grid, for instance, and its telecommunications networks — the military here (and elsewhere) sees disruptive software as an essential new tool of war. According to a study by the Center for Strategic and International Studies, the 15 countries with the biggest military budgets are all investing in offensive cyber capabilities. The latest step occurred last month when the United States sent out bids for technologies “to destroy, deny, degrade, disrupt, corrupt or usurp” an adversary’s attempt to use cyberspace for advantage. The Air Force asked for proposals to plan for and manage cyberwarfare, including the ability to launch superfast computer attacks and withstand retaliation. The United States, China, Russia, Britain and Israel began developing basic cyberattack...

Words: 492 - Pages: 2

Free Essay

Security Threats to Companies

...Final Essay- security Threats for companies | Security Threats for Companies | Focusing on Employees | | Meadows Steven A CTR SITEC United States Special Operations Command | 4/17/2014 | American Military University TABLE OF CONTENTS Introduction 2 Chapter 1 4 External Threats 1.1 4 Malicious Code 1.1.a 4 Firewalls 1.1.b 6 Chapter 2 7 Physical Threats 2.1 7 Structure Outside 2.1.a 7 Structure Inside 2.1.b 7 Chapter 3 9 Internal Threats 3.1 9 Employee Access 3.1.a 9 Employee Attitude 3.1.b 10 Employee Training 3.1.c 11 File Permissions 3.2 11 Least Access 3.2.a 11 References 12 Introduction The internet has become a global resource for the working companies. Those who utilize the internet have near endless resources at their fingertips. This gives companies large advantages that those that don't utilize the information available to them on the internet. However, with great advantages, and information, comes great responsibility, and risks. The internet is also full of those who want to hurt companies, for reasons unknown to the company or for reasons that the company may be aware of, but is unable to prevent. Companies will never be able to eliminate the human factor from the work place. Even as self-automation and computers take over the human bodies for work and productivity, the human factor is still there. Someone, somewhere has to have access to the systems in order to maintain accountability, control, quality, and ensure...

Words: 2691 - Pages: 11

Free Essay

Security Threats

...From: your name Date: n/a Subject: Security threats and the need for security measures The need for security measures is vital to the company. The risk of not protecting against known security threats can be catastrophic. For example, an insider attack can obtain business advantage (long-term business benefits), financial gain, and sabotage which can disrupt performance and corrupt data. Computer criminals known as hackers can obtain secure company information or even create malicious software to harm the system. We must implement ways to make the company more secure by installing firewalls, virus protection, spyware, and other malware protection. The following are three specific social engineering techniques and how to best prepare employees for each potential attack. • Dumpster diving a social engineering attack in which malicious users search through the organization’s trash in the hope of retrieving useful inside information. We must ensure documents and data are properly destroyed before disposing such as using a shredded for hard copies. Providing training and educating employees on guidelines on how to safely dispose of information. • Tailgating is an attack in which a malicious user follows closely behind an authorized user to bypass a security access point. Malicious users can also persuade someone to grant them access to an area without authorization by claiming to have lost or forgotten their access pass. Companies should have more than one security checkpoint...

Words: 360 - Pages: 2

Premium Essay

Security N Tsting

...Unit 5 Assignment 1: testing & monitoring security controls. Identify types of security events and baseline anomalies that might indicate suspicious activity. I. Unscheduled reboots on machines and servers that aren’t updates. II. non-business related websites. III. jump in packets. IV. passwords entered wrong to many times. Policy violations and security breaches: I. Watching the event logs of your servers for failed logons and other security-related events. Logs can tell an Admin a lot about the root of the issue and makes it easier to fix or manage from happening again. II. Best way to get rid of the traffic to certain web sites is to make a block list or outsource a company to make a block list for you. III. Use a software network scanner to monitor or track them. IV. User passwords are probably one of the most vulnerable ways to have a security breach. A proper password should consist of 8 characters or more, capital, number, system, and never a word, or date. Next best thing is ACS. Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate the risk and minimize exposer: 1.A user made unauthorized use of network resources by attacking network entities. Fire the employee or put employee on probation with limited access. 2.Open network drive shares allow storage privileges to outside users. 3.Sensitive laptop data is unencrypted and susceptible...

Words: 328 - Pages: 2

Free Essay

Fairytales

...Rice cakes and Starbucks by Ester Freud The text”Rice cakes and Starbucks” by Esther Freud from 2009 is about a British couple, Dan and Beth, who are married and have three children. They are now in Los Angeles, because Dan is an actor and he wants to get a career in USA. The day of the casting in the morning Dan and his family go to Starbucks to get some coffee, while he waits to go. Beth and the children wait for him there. At midday, Dan meets a casting woman from CBS, and she asks him some question about his experience and he mentions his family. At the end of the interview, she says to Dan that they will see him again soon. Back to Starbucks, he meets Beth. She asks about the casting, but he is not sure about how it went. However, he gets a call from his American manager, and finds out that she wants his daughter instead of him. Characterization of Dan and Beth Dan is married with Beth and they have three children. He is the provider in the family. He is ambitious about getting a career as an actor. Dan is an insecure person, because he does not believe in himself. For example at the casting, when the woman asks him about his experience and how his American accent was, he was a little nervous. He lies often and he is afraid to say the truth. He is a soft man and sometimes weak, because he is not strong enough to say his opinion and feelings. The fact that he only wanted a child and not three, says a lot about him, because he thinks about it, but he does say it to...

Words: 761 - Pages: 4

Free Essay

Reflectin

...For me, insecurities are made by the society. Society dictates what you should be. You should look like these to be considered beautiful, you need to have these number of friends to be popular, you only need to weigh these pounds to be thin and etc. The society puts on these standards about looks. And women tend to compare their body to these standards and gets insecure. Thus, insecurities affect self-esteem because the more insecurity you have, the chances of having low self esteem rises. As a youth of today, I think we need to teach women how to love their own body. They need to understand that beauty comes in different sizes and shapes. They need to love their body and accept all their flaws. There would be people who would keep on judging you because of your looks, but it is up to you if you would agree and let them do that. I also think that it’s time for society to stop transforming people’s perspective. Because the way society does it, changes our lives. We keep on judging other people because they are not society standard. These judgments can make a person insecure. But we should always remember that we are created in God’s image and likeness. God made us and saw that it is very good. Don’t let insecurity ruin the good thing. See. There are a lot of women that are insecure in this world. These usually occur when they compare their selves to other people. When they are insecure, it affects their perception towards other. They would tend to think negatively that...

Words: 453 - Pages: 2

Premium Essay

Go Fund Me

...moving onto Instagram. Through my visual training practice I have inspired many people like myself that with God absolutely everything is possible, including fitness goals. My training has also given me the strength to get over the mental hurdle of my own self-doubt when it comes to enjoying the enjoyable and beautiful things in life. I want more breakthroughs with society, when it comes to their fitness goals. I want more souls reached through inspiration, motivational speaking, & training. I want to help more people in greater ways than I ever have, teach more kids, and influence society with my mission. I recently had the idea to create my own fitness apparel line; however I kept putting it off because of my own insecurities, however I’m ready to kick insecurity in the face and achieve what God has purposed for me. I’m so grateful for the few believers that grew into hundreds. The clients that have worked out with me at their lowest point, and continued to follow my momentum to no matter what, I sincerely thank you. Nevertheless, I want to go higher, further, and take that road less traveled. I want to excel, and I can’t do it alone! I need your help taking that next step, as I prepare for one of my biggest business ventures ever. I want take High-Time Fitness into a whole new direction, around the world and right to YOU. I’m accepting all donations, support & prayer from all of my supporters. Thank you in...

Words: 283 - Pages: 2

Premium Essay

Cis 500 - Cyber Security in Business Organizations

...Case Study #1 Cyber Security in Business Organizations CIS 500: Information Systems for Decision-Making Cyber Security in Business Organizations On December 19, 2013, the Target Corporation in Minneapolis, MN, put out a press release on their website confirming there had been a security breach allowing unauthorized database access to their Point of Sale (POS) systems, between November 27 and December 15, 2013. Target reported approximately 40 million credit/debit card accounts could have been affected. In the release, Gregg Steinhafel, chairperson, president and chief executive officer, stated the following, “Target’s first priority is preserving the trust of our guests and we have moved swiftly to address this issue, so guests can shop with confidence. We regret any inconvenience this may cause. “We take this matter very seriously and are working with law enforcement to bring those responsible to justice.” (Target Press Release, 12/19/2013). Retailers are prime targets for hackers. Why? Simply stated, Risk versus Benefit. Retail stores compile a vast amount of financial data and banking information for millions of people across the country. It could be considered a new version of bank robbery. Rather than dealing with all the planning, resources needed and danger involved with robbing one actual bank, not to mention having to split the money with cohorts, hackers can skip the bank altogether. Obtaining consumers’ banking information provides all the benefits...

Words: 2080 - Pages: 9

Free Essay

Sec 280 Week 4

...There are many potentials security threats on a personal computer. These security threats are harmful to a personal computer because if successfully activated these attackers can retrieve your personal information and use it for their own use. These attacks can also slow down your personal computer and can eventually causing it to crash. If the computer crashes and you don’t have your information backed up somewhere you practically wont be able to retrieve your information. There are techniques that these attackers use to access information on your system. Potential security threats start with people; people who create these threats are to blame. These people are called hackers and predators. Hackers and predators create security threats and malware. They are computer programmers who use these security threats and malware to victimize other people by breaking into their systems to steal, change or destroy information. This is known as cyber-terrorism. Due to these hackers and predators computers are vulnerable at any time. These people create things like. Computer virus threats, Spyware threats, Phishing threats, Internet Worms, Rootkit, Zombies, Browser Hijacker, Email Virus, Mousetrapping, Spam, and Adware. Out of all the computers security threats out there the most well known is computer virus threats. The virus is a program that alters how a computer operates. The virus replicates and executes itself, this usually does damage to your computer. Spyware threats are an undercover...

Words: 734 - Pages: 3