{"id":13252,"date":"2026-03-20T03:49:03","date_gmt":"2026-03-20T03:49:03","guid":{"rendered":"https:\/\/division.iium.edu.my\/itd\/?page_id=13252"},"modified":"2026-04-02T01:09:33","modified_gmt":"2026-04-02T01:09:33","slug":"isms-objectives","status":"publish","type":"page","link":"https:\/\/division.iium.edu.my\/itd\/isms-objectives\/","title":{"rendered":"ISMS &#8211; Objectives"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"13252\" class=\"elementor elementor-13252\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bbeee7b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bbeee7b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e79b433\" data-id=\"e79b433\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4dc7a77 elementor-widget elementor-widget-text-editor\" data-id=\"4dc7a77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-sfc-cp=\"\" data-hveid=\"CAEIAhAA\" data-complete=\"true\" data-processed=\"true\"><h3><span style=\"color: #000000;\"><b>Objectives of ISMS Implementation<\/b><\/span><\/h3><p data-start=\"3490\" data-end=\"3618\"><span style=\"color: #000000;\">The implementation of the Information Security Management System (ISMS) at IIUM is driven by the following strategic objectives:<\/span><\/p><p data-start=\"3620\" data-end=\"3982\"><span style=\"color: #000000;\"><strong data-start=\"3620\" data-end=\"3665\">i. To Protect Information Data and Assets<\/strong><\/span><br data-start=\"3665\" data-end=\"3668\" \/><span style=\"color: #000000;\">To ensure that all forms of information\u2014whether digital, physical, or intellectual\u2014are adequately protected against unauthorized access, disclosure, alteration, and destruction. This includes safeguarding sensitive data such as student records, examination materials, research data, and administrative information.<\/span><\/p><p data-start=\"3984\" data-end=\"4320\"><span style=\"color: #000000;\"><strong data-start=\"3984\" data-end=\"4034\">ii. To Comply with ISO\/IEC 27001:2022 Standard<\/strong><\/span><br data-start=\"4034\" data-end=\"4037\" \/><span style=\"color: #000000;\">To establish and maintain a robust ISMS framework that fully complies with the requirements of ISO\/IEC 27001:2022, thereby enabling the university to achieve formal certification and demonstrate adherence to internationally accepted best practices in information security management.<\/span><\/p><p data-start=\"4322\" data-end=\"4470\"><span style=\"color: #000000;\"><strong data-start=\"4322\" data-end=\"4403\">iii. To Improve Data Confidentiality, Integrity, and Availability (CIA Triad)<\/strong><\/span><br data-start=\"4403\" data-end=\"4406\" \/><span style=\"color: #000000;\">To strengthen the three core principles of information security:<\/span><\/p><ul data-start=\"4471\" data-end=\"4746\"><li data-section-id=\"xw1psp\" data-start=\"4471\" data-end=\"4567\"><span style=\"color: #000000;\"><strong data-start=\"4473\" data-end=\"4492\">Confidentiality<\/strong> \u2013 Ensuring that information is accessible only to authorized individuals<\/span><\/li><li data-section-id=\"fhg9jx\" data-start=\"4568\" data-end=\"4658\"><span style=\"color: #000000;\"><strong data-start=\"4570\" data-end=\"4583\">Integrity<\/strong> \u2013 Maintaining the accuracy, completeness, and reliability of information<\/span><\/li><li data-section-id=\"bi35lu\" data-start=\"4659\" data-end=\"4746\"><span style=\"color: #000000;\"><strong data-start=\"4661\" data-end=\"4677\">Availability<\/strong> \u2013 Ensuring that information and systems are accessible when needed<\/span><\/li><\/ul><p data-start=\"4748\" data-end=\"5109\"><span style=\"color: #000000;\"><strong data-start=\"4748\" data-end=\"4790\">iv. To Foster a Security-Aware Culture<\/strong><\/span><br data-start=\"4790\" data-end=\"4793\" \/><span style=\"color: #000000;\">To cultivate a culture of information security awareness and responsibility among staff, students, and stakeholders through continuous training, awareness programmes, and policy enforcement. This includes promoting best practices such as secure password management, phishing awareness, and responsible data handling.<\/span><\/p><p><span style=\"color: #000000;\">\u00a0<\/span><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Objectives of ISMS Implementation The implementation of the Information Security Management System (ISMS) at IIUM is driven by the following strategic objectives: i. To Protect Information Data and AssetsTo ensure<\/p>\n","protected":false},"author":37,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":{"1":"page","2":"type-page","3":"status-publish","4":"hentry"},"_links":{"self":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages\/13252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/comments?post=13252"}],"version-history":[{"count":10,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages\/13252\/revisions"}],"predecessor-version":[{"id":13518,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages\/13252\/revisions\/13518"}],"wp:attachment":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/media?parent=13252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}