Protocols of information protection in computer networks and systems are investigated.The basic types of threats of infringement of the Wok Rings protection arising from the use of computer networks are classified.The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined.Their advantages and drawbacks are described.Perspective directions of development of cryptographic transformations for the maintenance of information protection in Multivitamins computer networks and systems are defined and analyzed.