Anomaly detection for ICS: A Case Study Anomaly Cases A.1: Unencrypted Passwords Are Used to Access a Networking Device