As IoT technology becomes an integral part of everyday life, enhancing productivity for businesses through automation, it should come as no surprise that attackers would seek to exploit these systems and the services they provide for profit. Through the Internet, attacks are capable of launching a number of diverse malicious actions such as Distributed Denial of Service (DDoS), Scanning/Probing, Keylogging, Malware proliferation, E-mail spamming, Click fraud, Phishing, Identity theft, and more [1,2]. As such, the need for reliable methods of investigation, which can be used for identification of security incidents, reconstruction of events and attribution is evident. As a result, the discipline of Digital Forensics was developed and continues evolving to cope with the composite nature of IoT environments resulting in what we call IoT forensics. This section is an introduction to digital forensics and its concepts.The main objectives of this chapter are as follows:1. To understand the digital forensic process. 2. To discuss the history of digital forensics and its related disciplines. 3. To learn the digital forensic investigation steps. 4. To discuss the various types of cyber-crime and digital evidence.