Disaster Management. As applied to cyber terrorism this term encompasses those actions taken for the purpose of restricting and limiting unauthorized access, specifically, reducing the probability that a threat will succeed in exploiting critical information management systems software and hardware. (VHA Emergency Management Guidebook 2005)