In this section, we'll look at the most popular and straightforward methods we can use for anomaly detection.