Security policy manager devices are leveraged by manager objects to use
highly secure user transparent communications to provide detection of
questionable activities at every node, automatic collection of
information related to any potential attack, isolation of the offending
object with arbitrary flexibility of response (e.g. flexibly determining
the level of certainty of an attack for initiation of a response in
accordance with the number of nodes to be partitioned that is determined
by the collected data concerning the potential attack), changing trust
relationships between security domains, limiting the attack and launching
offensive information warfare capabilities (e.g. outbound from the
compromised node while limiting or eliminating inbound communications) in
log time and simultaneously and/or concurrently in different but possibly
overlapping sections or segments of a digital network of arbitrary
configuration.