"constitution in which an information security policy management and audit support apparatus 31 and management and audit object computers 32 such as a server, a router and a firewall are connected to each other through a net work 33. [0045]FIG. 2 shows a constitution of the information security policy management and audit support apparatus 31. [0046] As shown in FIG. 2, a hardware structure of the" . . . .