A modest security analysis of cyber-physical systems: A case study