{"id":12784,"date":"2026-03-07T01:34:03","date_gmt":"2026-03-07T01:34:03","guid":{"rendered":"https:\/\/division.iium.edu.my\/itd\/?page_id=12784"},"modified":"2026-04-02T01:10:59","modified_gmt":"2026-04-02T01:10:59","slug":"isms-boundaries","status":"publish","type":"page","link":"https:\/\/division.iium.edu.my\/itd\/isms-boundaries\/","title":{"rendered":"ISMS &#8211; Boundaries"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12784\" class=\"elementor elementor-12784\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bbeee7b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bbeee7b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e79b433\" data-id=\"e79b433\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4dc7a77 elementor-widget elementor-widget-text-editor\" data-id=\"4dc7a77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-sfc-cp=\"\" data-hveid=\"CAEIAhAA\" data-complete=\"true\" data-processed=\"true\"><h3><span style=\"color: #000000;\">ISMS &#8211; Boundaries<\/span><\/h3><p data-start=\"5171\" data-end=\"5414\"><span style=\"color: #000000;\">The scope of the ISMS implementation defines the organizational units, locations, and systems covered under the certification. Establishing clear boundaries ensures focused implementation and effective management of information security risks.<\/span><\/p><h3 data-section-id=\"5unwpn\" data-start=\"5416\" data-end=\"5455\"><span style=\"color: #000000;\" role=\"text\"><strong data-start=\"5420\" data-end=\"5455\">Kulliyyahs \/ Divisions Involved<\/strong><\/span><\/h3><p data-start=\"5457\" data-end=\"5520\"><span style=\"color: #000000;\">The ISMS implementation encompasses the following key entities:<\/span><\/p><p data-start=\"5522\" data-end=\"5542\"><span style=\"color: #000000;\"><strong data-start=\"5522\" data-end=\"5542\">i. Gombak Campus<\/strong><\/span><\/p><ul data-start=\"5543\" data-end=\"5732\"><li data-section-id=\"gz3w3n\" data-start=\"5543\" data-end=\"5605\"><span style=\"color: #000000;\"><strong data-start=\"5545\" data-end=\"5603\">Kulliyyah of Economics and Management Sciences (KENMS)<\/strong><\/span><\/li><li data-section-id=\"rrwnl6\" data-start=\"5606\" data-end=\"5674\"><span style=\"color: #000000;\"><strong data-start=\"5608\" data-end=\"5672\">Kulliyyah of Information and Communication Technology (KICT)<\/strong><\/span><\/li><li data-section-id=\"zheoxp\" data-start=\"5675\" data-end=\"5732\"><span style=\"color: #000000;\"><strong data-start=\"5677\" data-end=\"5730\">Academic Management and Admission Division (AMAD)<\/strong><\/span><\/li><\/ul><p data-start=\"5734\" data-end=\"5865\"><span style=\"color: #000000;\">These units are critical due to their direct involvement in handling academic data, student information, and examination processes.<\/span><\/p><p data-start=\"5867\" data-end=\"5912\"><span style=\"color: #000000;\"><strong data-start=\"5867\" data-end=\"5912\">ii. Information Technology Division (ITD)<\/strong><\/span><\/p><ul data-start=\"5913\" data-end=\"5957\"><li data-section-id=\"jxe64c\" data-start=\"5913\" data-end=\"5934\"><span style=\"color: #000000;\"><strong data-start=\"5915\" data-end=\"5932\">Gombak Campus<\/strong><\/span><\/li><li data-section-id=\"b6igyj\" data-start=\"5935\" data-end=\"5957\"><span style=\"color: #000000;\"><strong data-start=\"5937\" data-end=\"5955\">Kuantan Campus<\/strong><\/span><\/li><\/ul><p data-start=\"5959\" data-end=\"6123\"><span style=\"color: #000000;\">The ITD plays a central role in managing ICT infrastructure, systems, networks, and cybersecurity operations, making it a core component of the ISMS implementation.<\/span><br \/><br \/><\/p><h3 data-section-id=\"xev50u\" data-start=\"6130\" data-end=\"6153\"><span style=\"color: #000000;\" role=\"text\"><strong data-start=\"6134\" data-end=\"6153\">System in Scope<\/strong><\/span><\/h3><p data-start=\"6155\" data-end=\"6177\"><span style=\"color: #000000;\"><strong data-start=\"6155\" data-end=\"6177\">Examination System<\/strong><\/span><\/p><p data-start=\"6179\" data-end=\"6363\"><span style=\"color: #000000;\">The <strong data-start=\"6183\" data-end=\"6205\">Examination System<\/strong> has been identified as the primary system within the ISMS scope due to its high sensitivity and criticality. This system manages essential processes such as:<\/span><\/p><ul data-start=\"6365\" data-end=\"6590\"><li data-section-id=\"15evkhz\" data-start=\"6365\" data-end=\"6408\"><span style=\"color: #000000;\">Examination scheduling and coordination<\/span><\/li><li data-section-id=\"az2shf\" data-start=\"6409\" data-end=\"6462\"><span style=\"color: #000000;\">Student assessment records and results processing<\/span><\/li><li data-section-id=\"145o9ih\" data-start=\"6463\" data-end=\"6518\"><span style=\"color: #000000;\">Secure storage and transmission of examination data<\/span><\/li><li data-section-id=\"dh64dz\" data-start=\"6519\" data-end=\"6590\"><span style=\"color: #000000;\">Access control for authorized academic and administrative personnel<\/span><\/li><\/ul><p data-start=\"6592\" data-end=\"6823\"><span style=\"color: #000000;\">Given the importance of maintaining the confidentiality, integrity, and availability of examination-related information, this system is prioritized for stringent security controls and continuous monitoring under the ISMS framework.<\/span><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>ISMS &#8211; Boundaries The scope of the ISMS implementation defines the organizational units, locations, and systems covered under the certification. Establishing clear boundaries ensures focused implementation and effective management of<\/p>\n","protected":false},"author":37,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":{"1":"page","2":"type-page","3":"status-publish","4":"hentry"},"_links":{"self":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages\/12784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/comments?post=12784"}],"version-history":[{"count":13,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages\/12784\/revisions"}],"predecessor-version":[{"id":13521,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages\/12784\/revisions\/13521"}],"wp:attachment":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/media?parent=12784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}