Early security considerations are essential to ensuring a system is adequately protected, but their ever-growing size and complexity often leaves full comprehension of a system's interconnections out of reach. This gives rise to implicit interactions. These unplanned or unforeseen communication sequences between components are security vulnerabilities that can be exploited to mount a cyberattack. Existing design-phase formal methods-based approaches exist to identify implicit interactions, but formal methods see limited adoption and the root cause of implicit interactions is not well understood.In this work, we extend the existing formal approach to suggest areas of a system to focus redesign efforts, while also providing alternative approaches that do not require formal expertise. These focus on graph-based measurements and providing a set of properties, quality attributes, and design principles with goals in line with the reduction of the prevalence of implicit interactions within a system design.I would like to thank my supervisor, Professor Jason Jaskolka, for his interest and guidance in this project. His support, encouragement, and ability to foster ideas and out-of-the-box thinking were all pivotal to the success of this work.I thank my colleagues for creating an inviting environment to share ideas, and for all their advice and constructive comments.Finally, I wish to thank my parents and my best friend for all their unconditional love and support over these past two years.